Skip to Main Content

SITE, Privafy Announce JV for delivery of Extended Detection and Response solution in the kingdom.

Contact Sales Login
Explore New Features
A Complete & Growing Menu of Cloud-Based Services
Privafy delivers — today’s most complete protection against cyber attacks. By integrating full-stack security functionality into a suite of cloud-native services, we’re able to safeguard your Data-in-Motion within all business environments — at a fraction of the cost of legacy solutions.
'

A complete security stack delivered from the cloud

Privafy’s cloud-based portfolio of products delivers a full security stack as a service, replacing hardware- and software-based security with simple, easy-to-use, and innovative services. Privafy protects data-in-motion as it moves between networks, devices, and the cloud. It safeguards networks against cyber attacks, phishing, and other cyber threats. And it does all this for a fraction of the cost of your current security stack.

Check out our full feature list!

Advanced, patented technologies included

Privafy solutions feature advanced, proprietary technologies that aren’t available anywhere else. For example, our Absolute Encryption™ schema defends against “man-in-the-middle” or unauthorized snooping attacks. Our patented endpoint identity protection guards against endpoint cloning. And our new Impervious Firewall™ technology delivers dynamic perimeter security with fine-grained rules for inbound and outbound control, plus deep content inspection for data loss prevention and comprehensive malware screening.

  • Non-degrading encryption at line rate:
    • Encryption of peer-to-peer communication without causing any line rate performance degradation
  • Privafy proprietary concurrent multi-key encryption:
    • Use of multiple keys for encrypting peer-to-peer connections
  • Zero-Touch Encryption Key Management:
    • Cloud based key management with no human intervention
  • Key Management using hyperledger:
    • Hyperledger Block chaining based security key generation and storage
  • Intelligent high frequency encryption key rotation:
    • Automated key rotation at high frequency to reduce the amount of content encrypted using that
  • Privafy Standard Website and Destination Access Control
    • Web classification and reputation:
      • Web classification and reputation based control of outgoing traffic
    • IP reputation:
      • IP reputation (malware etc) based control of outgoing traffic
    • Anti-phishing:
      • Prevent outgoing traffic to sites that attempt phishing
  • Site and destination access control through DNS Filtering
  • Traffic flow monitoring and policy enforcement, intelligent DNS
    • Geography:
      • Security policy enforcement and traffic filtering based on geography accessed
    • URL Filtering:
      • Traffic filtering based on URL accessed
    • Destination IP address:
      • Traffic filtering based on Destination IP address
    • Protocols and Ports*:
      • Traffic filtering based on standard protocols such as ICMP/SMTP etc, or ports accessed
  • Malicious URL steering (add-on):
    • Block traffic going towards malicious URLs and steer towards a configured destination instead
  • ML-based outlier detection (add-on):
    • Machine learning based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
  • AI integration ready (add-on):
    • Supports visibility and control interfaces to integrate with AI based systems for dynamic policy control
  • Standard Privafy dictionaries:
    • Data loss prevention by detecting any anomalous data transfer using standard rules and dictionaries
    • Traffic filtering by application accessed
    • Traffic filtering by file type accessed
  • Customer supplied policies (add-on):
    • Data loss prevention by detecting any anomalous data transfer using customer dictionaries
  • AI-based traffic flow anomaly detection:
    • Data loss prevention using Machine learning driven dynamic updates to rules based on behavioral analysis of the customer traffic
  • Visibility into Public/ private cloud access
    and SaaS

    • Per-User Based Visibility:
      • Visibility into Cloud Services access per user
  • Data Security:
    • DLP*/Data loss prevention
  • Threat Protection
    • Standard-based on Privafy selected threat databases:
      • Intrusion detection for inbound access from malicious sources using standard Privafy dictionaries
    • Customer-selected threat databases (add-on):
      • Intrusion detection for inbound access from malicious sources using customer-provided dictionaries
    • AI-driven augmentation of threat databases (add-on):
      • Intrusion detection: Machine learning-driven dynamic updates to threat database based on behavioral analysis of the customer traffic
    • Standard Privafy policies and actions, including block and notify:
      • Intrusion prevention for inbound access from malicious sources using standard Privafy policies. Supports the ability to alert and block
    • Custom-provided policies and actions (add-on):
      • Intrusion prevention for inbound access from malicious sources using customer-defined policies. Supports the ability to redirect
    • Privafy proprietary site-based DoS & DDoS detection & mitigation:
      • Mitigation of Site DoS and DDoS attacks based on standard Privafy rules
    • ML-based outlier detection (add-on):
      • Machine learning-based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
  • Granular access policy for Public/Private cloud and Saas
    • Policy-based access control for the user
  • FIPS 140-2/3 (add-on)
  • JITC (add-on)
  • Common Criteria (CC) (add-on)
  • Rapid implementation using zero-touch provisioning
    • Auto-discovery:
      • Zero-touch Provisioning (ZTP) for initial setup for rapid service instantiation
    • Automated install from Privafy cloud:
      • Cloud-backed automated config and policy management
    • Intelligent profile assignment, validation, and activation:
      • Ability to assign profile based on higher-level policy, auditing, and activation
  • Companion App:
    • Easy to use, BlueTooth-based mobile app for assisted device setup
  • Categorization of alerting and alarms by severity and actionable:
    • Alarms and alerts to notify user of actionable and reportable activities
  • User-selected multi-level event logging:
    • Detailed event logs for troubleshooting and compliance
  • Audit trails for system and user activity
  • Multiple administrator profiles and permissions for policy controls:
    • RBAC for Privafy Central to allow roles like a business owner, technical admin, billing admin
  • Real-time visibility of the usage, performance, and health
    • Visibility:
      • Real-time dashboard view of the systems with network stats, health, and insights on the network behavior at multiple granularity levels
      • Control:
        • Real-time controls on the dashboard to update and edit security and traffic rules of the network from the intuitive UI
      • Reporting:
        • REST API-based reporting of above
      • Event logging:
        • REST API to expose events for use with existing tools
      • Alerting:
        • REST API to expose alerts for use with existing tools
  • Integration with user directories:
    • Microsoft active directory
    • Google Suite directory
  • Multi-Cloud container architecture:
    • Container-based cloud-agnostic architecture that allows hosting in multiple public clouds for high performance and fault tolerance
  • Custom Private-Public Cloud Redundancy (add-on):
    • Multiple cloud-hosted models ensure redundancy across multiple public clouds
  • Geographical redundancy – Local, Regional, Global:
    • Geographical redundancy at local, regional, and global levels due to a multi-cloud architecture
  • Active-active per-customer container-based cluster (add-on):
    • Active-active customer allocated Privafy service cluster
  • Database redundancy:
    • Service database redundancy for no loss of data and customer configurations
  • Customer Information Protection:
    • Privafy standards ensure customer information is not visible to anyone, including the Privafy services team
  • Amazon Web Service (AWS):
    • Secure connectivity between a Company’s physical locations and AWS public cloud
  • Microsoft Azure:
    • Secure connectivity between a Company’s physical locations and Azure public cloud
  • Google Cloud Platform (GCP):
    • Secure connectivity between a Company’s physical locations and GCP public cloud
  • Secure Access to Private Cloud (add-on):
    • Secure connectivity between a Company’s physical locations and their private cloud
  • Privafy Intrusion Detection System
    • Standard based on Privafy selected threat databases:
      • Intrusion detection for inbound access from malicious sources using standard Privafy dictionaries
    • Customer selected threat databases (add-on):
      • Intrusion detection for inbound access from malicious sources using customer provided dictionaries
    • AI-driven augmentation of threat databases (add-on):
      • Intrusion detection: Machine learning driven dynamic updates to threat database based on behavioral analysis of the customer traffic
  • Privafy Intrusion Prevention System
    • Standard Privafy policies and actions including block and notify:
      • Intrusion prevention for inbound access from malicious sources using standard Privafy policies. Supports ability to alert and block
    • Custom provided policies and actions (add-on):
      • Intrusion prevention for inbound access from malicious sources using customer defined policies. Supports ability to redirect
  • Denial of Service Prevention
    • Privafy proprietary site-based DoS & DDoS detection & mitigation:
      • Mitigation of Site DoS and DDoS attacks based on standard Privafy rules
    • Pre-emptive network-wide DoS & DDoS prevention rules*:
      • Dynamically preventing DoS and DDoS by implementing policies pre-empted by knowledge of attacks from other networks under Privafy management
  • Generic Inbound service management:
    • Ability to allow inbound access to the network only for authorized IP address
  • Header Inspection
    • Standard dictionaries and self-identified site ratings:
      • Headers based Inspection of content to detect and prevent loss of sensitive data using standard Privafy rules
    • Customer supplied policies * (add-on):
      • Headers based Inspection of content to detect and prevent loss of sensitive data using customer rules
    • AI-augmented dictionaries and ratings (add-on):
      • Headers based Inspection of content to detect and prevent loss of sensitive data using rules that are dynamically updated by Machine learning based on behavioral analysis of the customer traffic
  • Payload Inspection
    • Payload inspection using Private Intermediate Root Certificate:
      • Payload inspection using Private Intermediate Root Certificate
    • Standard Privafy dictionaries-based policies:
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses standard Privafy rules for authorizing the data flow
    • Customer supplied policies (add-on):
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses customer-provided rules for authorizing the data flow
    • AI-augmented dictionaries and ratings (add-on):
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses Machine learning-driven dynamic updates to rules to create a behavioral analysis of the customer traffic, for authorizing the data flow
  • Sandbox & Quarantine of unknown and suspicious content * (add-on):
    • Ability to sandbox and quarantine suspicious content
  • Device/Endpoint detection & classification:
    • Detection of device or endpoint based on anomalous behavior and alerting with classification
  • HIPAA
  • PCI
  • SOC2
  • Customer Traffic Prioritization
    • By Application*:
      • Prioritization of traffic based on criticality of the application to the business
    • Destination and Geography*:
      • Prioritization of traffic based on the destination or geography of traffic flow
    • Customer provided dictionaries for routing policies (add-on):
      • Prioritization of traffic based on customer defined policies
    • Policy-based bandwidth allocation*:
      • Bandwidth allocation for traffic based on predefined policies
  • Customer supplied per user traffic steering policy (Source/Cloud) (add-on):
    • Traffic policies at user level
  • Dashboard(s) for traffic data visualization:
    • Dashboard for visibility at network, user, device and application level
  • Intra-LAN traffic & broadcast detection & classification:
    • Intra-LAN traffic & broadcast detection and classification based on anomalous behavior, alerting to safeguard other users in the network
* Feature is coming soon.

Want to simplify—and strengthen—your security, eliminate deployment complexity, and slash expenses associated with ineffective legacy solutions? Let’s talk.

Contact Sales