Cyberdefense in depth with validy technology

1

Click here to load reader

Transcript of Cyberdefense in depth with validy technology

Page 1: Cyberdefense in depth with validy technology

www.validy.com

Contact: Gilles SGRO, President, +33 684 60 00 96, [email protected]

CYBERDEFENSE IN DEPTH WITHOUT OR WITH VALIDY

« Traditional » cyberdefense in depth

Defense

line #1

Defense

line #2 Defense

line #3

Assets

to protect

Threats

Firewall

Intrusion

Detection

System

Antivirus

Programs under

execution

Security obtained by 3 lines of defense: a Firewall, an Intrusion Detection System (IDS) and an Antivirus

Cyberdefense in depth with VALIDY

Threats

Defense

line #1

Defense

line #2

Defense

line #3

Defense

line #4

Defense

line #5

Defense

line #6

Assets to

protect

Firewall

VALIDY’s Protection

Intrusion

Detection

System

Antivirus

Operating

System

Database

engine

Protection of

the programs

Programs

under

execution

Security obtained by adding the VALIDY Technology protection to each traditional defense line, but also to the

Operating System, the Database engine and to the programs themselves.