top of page
Weborion-1-1-1.png

เว็บโอไรออน® 
การป้องกันจุดสิ้นสุดของธุรกิจ 

ในการรักษาความปลอดภัยให้กับธุรกิจ คุณต้องมีการป้องกันปลายทางที่แข็งแกร่งและชาญฉลาดกว่าโปรแกรมป้องกันไวรัสสำหรับธุรกิจแบบดั้งเดิม

image.png

WEBorion® 

การป้องกันจุดสิ้นสุดของธุรกิจ 

image_edited_edited.png
ในการรักษาความปลอดภัยให้กับธุรกิจ คุณต้องมีการป้องกันปลายทางที่แข็งแกร่งและชาญฉลาดกว่าโปรแกรมป้องกันไวรัสสำหรับธุรกิจแบบดั้งเดิม
image_edited_edited.png

Platform Independent

Our Monitor supports websites hosted on-premise or in the cloud. We also support any web technology stack including popular Content Management System (CMS) such as WordPress, Joomla, and Drupal, Magnolia, Sitefinity, etc.

image_edited_edited.png

Automated with Integrated Response

Our Monitor can be integrated with our Restorer to provide a one-touch or automatic failover to a temporary Secure Replica to preserve your online presence and branding.

AI-Powered Plus Many More

Our advanced and configurable engines, with highly advanced AI option, are carefully designed to detect changes due to web defacement, malicious code, third-party Javascripts, malware, and more. Unique and Intelligent baseline process automatically differentiates dynamic and static parts of your website, allowing more effective web monitoring with minimal false alerts.

image.png

Content Analytics

Analyzes HTML source code (e.g. page title, links and frames) to determine if the webpage has been modified

image.png

Automate Integrity Analytics

Analyzes HTML source code (e.g. page title, links and frames) to determine if the webpage has been modified

image.png

Artificial Intelligence Engine

Our Unique AI Engine runs advanced Natural Language Processing (NLP) models that were trained from >10years

image.png

Image Analytics

Besides code and file checks, our Monitor also renders the webpage as an image to do advanced pixel analysis.

image.png

Javascript Malware Detection Engine

Our Malware Engine checks for the presence of well-known card skimming and cryptojacking javascripts

image.png

SSL/DNS/Whois Change Monitoring

Our Monitor tracks any changes to the DNS and Whois configurations of the website

image.png

Payment Page Monitoring

Our Monitor can be programmed to monitor important payment pages to prevent card-skimming attacks

image.png

HTTP Header Monitoring

Our Monitor will scan regularly for any change or tampering of the HTTP Headers. This includes checking for CSP and HTTP

image.png

SSL/DNS/Whois Change Monitoring

Our Monitor can also provide the continuous monitoring of the script inventory from inline, first, second, third and fourth party

Flexible Deployment Models

Cloud SaaS Subscription

Fast and Easy Deployment

image_edited_edited.png

Near instantaneous on-boarding with a Cloud SaaS account

image_edited_edited.png

Highly scalable to support thousands of websites or URLs all over the world

image_edited_edited.png

Share hosting provides optimal costing and speed of deployment

Cloud VPC or On-Premise

Dedicated to your environment

image_edited_edited.png

Packaged as a virtual appliance that can operate as a virtual machine (VM) or docker container

image_edited_edited.png

Can be deployed in any VPC in your public cloud (including AWS, Azure, Google, Huawei, etc)

image_edited_edited.png

Provides data sovereignty and security settings customized to your environment

High Level Network Architecture

High-Level-Network-Architecture-1.jpeg

Our Solution and Approach

We believe in having a holistic approach to securing your web identity. Having seen many customers get hacked and not being able to recover quickly, we want to change this with the 5 components in our Web Security Loop:

image.png

Review

The first step in securing websites is to conduct a thorough review to identify security loopholes. This can be done via scanning tools, and applying the relevant software upgrades and patches.

image.png

Protect

A web application firewall (WAF) should be put in to protect the website. WAFs are able to detect and prevent common web application attacks such as cross-site scripting and SQL injections.

image.png

Detect

A proactive monitoring mechanism will allow the organization to act quickly before external parties discover the security breach.

image.png

Respond

Organizations need to have an incident response plan in the event of an attack, which includes mechanisms on backing up and securely restoring their web presence.

Detect

A proactive monitoring mechanism will allow the organization to act quickly before external parties discover the security breach.

image.png
bottom of page