Centripetal set out a few years ago with a single mission: to protect organizations from advanced threats. How we delivered on this mission is what’s dramatically different about us. We’ve developed a revolutionary solution that offers cyber teams continuous prevention from attacks through intelligence- led enforcement.
Our solution is the threat intelligence gateway, which extrapolates every and any threat intelligence feed and applies advanced packet filtering at the network edge to prevent unwanted traffic from ever hitting a network.
We’ve simplified threat intelligence collection, management, and action (or enforcement, as we call it), by taking hundreds of millions of indicators and distilling them to a finite number of rules to prevent millions of threats and deliver an unprecedented intelligence-led defense.
Manually sifting through packet capture logs, or relying only on sending logs to a SIEM platform does not scale to today's expanding attack surface. And we know firewalls and IPS systems aren't effective at processing hundreds of millions of indicators.
This is where advanced packet filtering leveraging threat intelligence becomes a critical technology in today's SOC. One major component of our threat intelligence gateway solution is the actual enforcement point, RuleGATE®. The RuleGATE is a physical or virtual appliance, and can be configured to meet speed and scale requirements.
Our powerful RuleGATE appliances perform essential functions within the CleanINTERNET service:
Threat intelligence comes in many forms and flavors. Centripetal's enforcement of threat intelligence is made possible by sublinear filtering and the correlation of a massive amount of threat data. Centripetal has solved the challenge of complex data processing and filtering so customers don't have to take it on.
In order to prevent hundreds of millions of threats, the curation and correlation of bulk threat data has to convert to policies that instruct what's enforced. The policy construct of our Threat Intelligence Gateway is designed for operating across a risk-based spectrum to optimize and prioritize human analysis and workflow.
Centripetal's intelligence policies are built from complex combinations of static and dynamic rules so that rules and policies can be constructed to filter on any combination of the following elements, which are typically part of the commercial indicator of compromise. Where no other technology is effective? It's not just malicious IP's:
Centripetal has architected its technology to process unprecedented amounts of threat data, and to enforce based on complex policies and rules in real time. Centripetal's technology stack includes advanced management and analytics for visibility into those threats that were prevented or where more investigation is necessary.
Centripetal's QuickTHREAT Analytics Manager lets organizations manage dynamic threat intelligence subscriptions, create and manage threat intelligence indicator sets, and build, maintain, and enforce cyber-security policies to meet the needs of the organization.
System administrators gain full visibility into the status and health of their RuleGate® enforement filters deployed, including full control over network infrastructure and high-availability configurations that integrate into SIEM platforms and any SOC tool.
Specific technical capabilities include: