- Non-degrading encryption at line rate:
- Encryption of peer-to-peer communication without causing any line rate performance degradation
- Privafy proprietary concurrent multi-key encryption:
- Use of multiple keys for encrypting peer-to-peer connections
- Zero-Touch Encryption Key Management:
- Cloud based key management with no human intervention
- Key Management using hyperledger:
- Hyperledger Block chaining based security key generation and storage
- Intelligent high frequency encryption key rotation:
- Automated key rotation at high frequency to reduce the amount of content encrypted using that
- Privafy Standard Website and Destination Access Control
- Web classification and reputation:
- Web classification and reputation based control of outgoing traffic
- IP reputation:
- IP reputation (malware etc) based control of outgoing traffic
- Anti-phishing:
- Prevent outgoing traffic to sites that attempt phishing
- Web classification and reputation:
- Site and destination access control through DNS Filtering
- Traffic flow monitoring and policy enforcement, intelligent DNS
- Geography:
- Security policy enforcement and traffic filtering based on geography accessed
- URL Filtering:
- Traffic filtering based on URL accessed
- Destination IP address:
- Traffic filtering based on Destination IP address
- Protocols and Ports*:
- Traffic filtering based on standard protocols such as ICMP/SMTP etc, or ports accessed
- Geography:
- Malicious URL steering (add-on):
- Block traffic going towards malicious URLs and steer towards a configured destination instead
- ML-based outlier detection (add-on):
- Machine learning based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
- AI integration ready (add-on):
- Supports visibility and control interfaces to integrate with AI based systems for dynamic policy control
- Standard Privafy dictionaries:
- Data loss prevention by detecting any anomalous data transfer using standard rules and dictionaries
- Traffic filtering by application accessed
- Traffic filtering by file type accessed
- Customer supplied policies (add-on):
- Data loss prevention by detecting any anomalous data transfer using customer dictionaries
- AI-based traffic flow anomaly detection:
- Data loss prevention using Machine learning driven dynamic updates to rules based on behavioral analysis of the customer traffic
- Visibility into Public/ private cloud access
and SaaS- Per-User Based Visibility:
- Visibility into Cloud Services access per user
- Per-User Based Visibility:
- Data Security:
- DLP*/Data loss prevention
- Threat Protection
- Standard-based on Privafy selected threat databases:
- Intrusion detection for inbound access from malicious sources using standard Privafy dictionaries
- Customer-selected threat databases (add-on):
- Intrusion detection for inbound access from malicious sources using customer-provided dictionaries
- AI-driven augmentation of threat databases (add-on):
- Intrusion detection: Machine learning-driven dynamic updates to threat database based on behavioral analysis of the customer traffic
- Standard Privafy policies and actions, including block and notify:
- Intrusion prevention for inbound access from malicious sources using standard Privafy policies. Supports the ability to alert and block
- Custom-provided policies and actions (add-on):
- Intrusion prevention for inbound access from malicious sources using customer-defined policies. Supports the ability to redirect
- Privafy proprietary site-based DoS & DDoS detection & mitigation:
- Mitigation of Site DoS and DDoS attacks based on standard Privafy rules
- ML-based outlier detection (add-on):
- Machine learning-based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
- Standard-based on Privafy selected threat databases:
- Granular access policy for Public/Private cloud and Saas
- Policy-based access control for the user
- FIPS 140-2/3 (add-on)
- JITC (add-on)
- Common Criteria (CC) (add-on)
- Rapid implementation using zero-touch provisioning
- Auto-discovery:
- Zero-touch Provisioning (ZTP) for initial setup for rapid service instantiation
- Automated install from Privafy cloud:
- Cloud-backed automated config and policy management
- Intelligent profile assignment, validation, and activation:
- Ability to assign profile based on higher-level policy, auditing, and activation
- Auto-discovery:
- Companion App:
- Easy to use, BlueTooth-based mobile app for assisted device setup
- Categorization of alerting and alarms by severity and actionable:
- Alarms and alerts to notify user of actionable and reportable activities
- User-selected multi-level event logging:
- Detailed event logs for troubleshooting and compliance
- Audit trails for system and user activity
- Multiple administrator profiles and permissions for policy controls:
- RBAC for Privafy Central to allow roles like a business owner, technical admin, billing admin
- Real-time visibility of the usage, performance, and health
- Visibility:
- Real-time dashboard view of the systems with network stats, health, and insights on the network behavior at multiple granularity levels
- Control:
- Real-time controls on the dashboard to update and edit security and traffic rules of the network from the intuitive UI
- Reporting:
- REST API-based reporting of above
- Event logging:
- REST API to expose events for use with existing tools
- Alerting:
- REST API to expose alerts for use with existing tools
- Visibility:
- Integration with user directories:
- Microsoft active directory
- Google Suite directory
- Multi-Cloud container architecture:
- Container-based cloud-agnostic architecture that allows hosting in multiple public clouds for high performance and fault tolerance
- Custom Private-Public Cloud Redundancy (add-on):
- Multiple cloud-hosted models ensure redundancy across multiple public clouds
- Geographical redundancy – Local, Regional, Global:
- Geographical redundancy at local, regional, and global levels due to a multi-cloud architecture
- Active-active per-customer container-based cluster (add-on):
- Active-active customer allocated Privafy service cluster
- Database redundancy:
- Service database redundancy for no loss of data and customer configurations
- Customer Information Protection:
- Privafy standards ensure customer information is not visible to anyone, including the Privafy services team