Home Perimetrical

Total edge security

Perimetrical

All areas of the IT ecosystem are exposed to a cyberattack to a greater or lesser extent. At Transparent Edge, we deal with hundreds of them on a daily basis, which allows us to develop different technologies for efficient threat detection and mitigation.

These features are unified in a complete and robust cybersecurity solution that protects your entire online business. With real-time visibility, precise controls, and the ability to stop the most sophisticated threats from a single platform. Free your team while shielding the security of your entire digital ecosystem.

Total cybersecurity at the edge
Solución digital integral

ACTIVE MONITORING

Perimetrical performs active monitoring and can proactively detect, manage and mitigate attacks while you focus on growing your business.

Without the need to define rules and guaranteeing minimum latency, but with all the visibility offered by our advanced analytics system.

Perimetrical provides an efficient and constantly updated response to protect your sites and APIs against any possible cybersecurity incident.

Comprehensively monitor and protect

Perimetrical detects and mitigates highly sophisticated cyberattacks. The capacity and scope of this technology is always up to date with the latest trends in cybersecurity, thanks to the combination of advanced analytics and a great team of experts.

Perimetrical. La suite de ciberseguridad de Transparent Edge

Perimetrical: our edge cybersecurity solution

WAF

Our next-generation WAF detects and blocks malicious traffic, protecting your websites and APIs from application attacks and exploiting vulnerabilities.

  • SQL Injection, XSS, and CSRF
  • Advanced threats beyond the OWASP top 10
  • Account Takeover (ATO)
  • Multi-level security support
  • Strict Mode & Detection-Only Mode
  • TLS Encryption
  • Bot detection (captcha, cookie, Javascript)
  • Rate limit
  • Custom Signatures

Bot Mitigation

This solution protects websites, applications and APIs in real time from the action of the most advanced and evasive bots, without harming the traffic essential to your business.

  • IPs with low reputation
  • Low-reputation datacenters
  • Low Reputation ASN
  • Abuse Lists
  • VPNs
  • TOR Networks
  • Anonymous Proxy Networks
  • List of bogons

Anti-DDoS

Our state-of-the-art Anti DDoS efficiently mitigates layers 3 & 4 web service outage DDoS, while specialized layer 7 protection capabilities curb application-targeted volume attacks.

In layers 3 & 4:

  • Flood of SSL, UDP, GRE-IP UDP, SYN, TCP RST, TCP CONNECT() and TCP ACK negotiation
  • DNS, NTP, CharGEN, Memcache, SSD, and SNMP amplification
  • Tsunami SYN
  • Fragmentation and CLDAP attacks
  • ARMS (ARD)
  • Jenkins
  • DNS Dropper
  • CoAP
  • WS-DD
  • NetBIOS

On layer 7:

  • Flood of HTTP/S, login, author, session, and content requests
  • DNS Amplification
  • Brute Force Attacks
  • Slowlories

Anomaly Detection

This system analyzes your website traffic to detect patterns and identify changes that may be signs of an attack. It allows you to configure alerts and reactions to anomalies to customize them to the needs of your sites. It alerts you when it detects an anomaly and offers the possibility of activating our systems to react to an incident when the time comes.

  • Increased bandwidth and/or requests (DDoS detection)
  • Increase in requests per IP (identifies potential crawlers and scrappers)
  • Decreased cache effectiveness
  • Increased the number of status code 503
  • Increased origin response time
  • Vulnerability Scanner

European DNA

Our values are European and, in accordance with the GDPR of our community, we do not track or identify users. We recognize malicious IP addresses thanks to the advanced technology of our solutions.

Early Support

We have experts who respond efficiently 24×7 to mitigate attacks as quickly as possible. No tool is 100% safe without an early response team behind it.

Real Visibility

Our advanced analytics collect and analyze traffic to detect any incidents. And, in addition, it retains the data for a week in case it is necessary to bring an incident to the attention of the State Security Forces and Corps.