top of page
Weborion-1-1-1.png

WebOrion® Monitor 

WebOrion® Monitor provides an instantaneous, agentless and continuous way to monitor all your websites for many hacks including defacements, tampering of HTTP headers, javascripts, TLS certificates and DNS/Whois changes. Our high-fidelity approach in monitoring your website, using our powerful and innovative engines, provides you with a high level of assurance and reliability.

image.png

Comprehensive and AI-Powered Capabilities

image_edited_edited.png

Proactive 24x7 Agentless Monitoring

Our Monitor can be easily set up in minutes with no agent installation.  It will proactively poll your webpage round the clock to give you greater assurance that your website’s confidentiality, integrity and reputation is intact in front of your customers and partners.

image_edited_edited.png

Platform Independent

Our Monitor supports websites hosted on-premise or in the cloud. We also support any web technology stack including popular Content Management System (CMS) such as WordPress, Joomla, and Drupal, Magnolia, Sitefinity, etc.

image_edited_edited.png

Automated with Integrated Response

Our Monitor can be integrated with our Restorer to provide a one-touch or automatic failover to a temporary Secure Replica to preserve your online presence and branding.

AI-Powered Plus Many More

Our advanced and configurable engines, with highly advanced AI option, are carefully designed to detect changes due to web defacement, malicious code, third-party Javascripts, malware, and more. Unique and Intelligent baseline process automatically differentiates dynamic and static parts of your website, allowing more effective web monitoring with minimal false alerts.

image.png

Content Analytics

Analyzes HTML source code (e.g. page title, links and frames) to determine if the webpage has been modified

image.png

Automate Integrity Analytics

Analyzes HTML source code (e.g. page title, links and frames) to determine if the webpage has been modified

image.png

Artificial Intelligence Engine

Our Unique AI Engine runs advanced Natural Language Processing (NLP) models that were trained from >10years

image.png

Image Analytics

Besides code and file checks, our Monitor also renders the webpage as an image to do advanced pixel analysis.

image.png

Javascript Malware Detection Engine

Our Malware Engine checks for the presence of well-known card skimming and cryptojacking javascripts

image.png

SSL/DNS/Whois Change Monitoring

Our Monitor tracks any changes to the DNS and Whois configurations of the website

image.png

Payment Page Monitoring

Our Monitor can be programmed to monitor important payment pages to prevent card-skimming attacks

image.png

HTTP Header Monitoring

Our Monitor will scan regularly for any change or tampering of the HTTP Headers. This includes checking for CSP and HTTP

image.png

SSL/DNS/Whois Change Monitoring

Our Monitor can also provide the continuous monitoring of the script inventory from inline, first, second, third and fourth party

Flexible Deployment Models

Cloud SaaS Subscription

Fast and Easy Deployment

image_edited_edited.png

Near instantaneous on-boarding with a Cloud SaaS account

image_edited_edited.png

Highly scalable to support thousands of websites or URLs all over the world

image_edited_edited.png

Share hosting provides optimal costing and speed of deployment

Cloud VPC or On-Premise

Dedicated to your environment

image_edited_edited.png

Packaged as a virtual appliance that can operate as a virtual machine (VM) or docker container

image_edited_edited.png

Can be deployed in any VPC in your public cloud (including AWS, Azure, Google, Huawei, etc)

image_edited_edited.png

Provides data sovereignty and security settings customized to your environment

High Level Network Architecture

High-Level-Network-Architecture-1.jpeg

Our Solution and Approach

We believe in having a holistic approach to securing your web identity. Having seen many customers get hacked and not being able to recover quickly, we want to change this with the 5 components in our Web Security Loop:

image.png

Review

The first step in securing websites is to conduct a thorough review to identify security loopholes. This can be done via scanning tools, and applying the relevant software upgrades and patches.

image.png

Protect

A web application firewall (WAF) should be put in to protect the website. WAFs are able to detect and prevent common web application attacks such as cross-site scripting and SQL injections.

image.png

Detect

A proactive monitoring mechanism will allow the organization to act quickly before external parties discover the security breach.

image.png

Respond

Organizations need to have an incident response plan in the event of an attack, which includes mechanisms on backing up and securely restoring their web presence.

Detect

A proactive monitoring mechanism will allow the organization to act quickly before external parties discover the security breach.

image.png
bottom of page