Foiler Brochure

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

LockGATE Tec LLC

Redefining The Impossible

Foiler
PROTECTING THE CYBER USER FROM THE UNKNOWN
Protecting his Money Protecting his Identity Protecting his Credit Rating Protecting his Data

PROTECTION FROM Phishing Spear Phishing Whaling Pharming Hacking


Foiler A Next Generation Product from

LockGATE Tec LLC


94 A N Elm Street 103 Westfield MA 01085, United States of America Tel +1 413 427 6092 Fax +1 413 562 3728 1 of 4

LockGATE Tec LLC INTRODUCTION

Waking up to find ones Bank Account cleaned out is every persons nightmare. Technology has brought with it a new breed of people Cyber Criminals. Greed and temptation coupled with ease of theft and negligible risk has resulted in high levels of brashness, and an ever increasing number of people who have their money in Banks cleaned out. Reactive Cyber Security technologies are of no help. A paradigm shift in technology is needed to prevent, rather than analyze Cyber Crime. A technology that can protect the Cyber User, not just the Computer. Phishing , Spear Phishing, Pharming are major threats today. If unchecked, it can potentially threaten the Banking Industry and the very existence of Banks, in extreme cases. Foiler the answer to every Cyber Users Dream Protection. Foiler is FULLY PROACTIVE and will prevent the very first Cyber User from falling victim to a threat. Foiler identifies ALL phishing and hacking attempts in their UNKNOWN State still thought to be impossible by many. Foiler is fully automatic with no user determination. Indeed there is no user interaction with Foiler. Foiler is the protection that every individual, organization and Government needs.

Foiler makes risk avoidable Technology:Redefining the Impossible


Foiler is fully and completely proactive, identifying all phishing sites in their "unknown" state. Foiler identifies all email based hacking components including key loggers, spyware in their "unknown" state. It does not use "signature" or "behavior" and hence needs no updates. It effectively protects from Advanced Persistent Threats and targeted attacks such as Spear Phishing and Whaling. It does not use any IP database - indeed there is NO reactive component in Foiler. To deliver what many believe impossible, Foiler is based on a technology completely different from all others. Foiler uses the events and Processes on a local computer to identify hacking components in their unknown state, and prevent the User from voluntarily entering sensitive information to phishing sites.

2 of 4

Prevention:
The increasing sophistication of phishing and its variants has led to high risk of loss of sensitive information. Phishing can cause immediate and serious damage, both terms of data and money. Foiler fills this gap with accurate detection technology that can prevent any damage by detecting all phishing attempts in the unknown state.

Foiler - Pioneering a new Revolution

Phishing, Spear Phishing, Whaling:


To identify a phishing site, Foiler is triggered when the user clicks a link received over email. Foiler then reads the content of the webpage downloaded as a result of the user click on email. If this returns a positive upon validation, the URL tab is closed and the user warned. Thus the very first user who receives a phishing URL that he believes to be genuine is protected from handing over sensitive data. At no point is any question triggered to the user and the entire process is fully automatic.

Now, for the first time globally, LockGATE Tec LLC, presents FOILER a paradigm shift in anti-phishing technology. Foiler is the first step towards providing comprehensive from protection from all kinds of phishing sites. Moreover, Foiler does not need constant updates to deliver protection.

Proactive - the way security should have always been Hacking components:
Foiler is triggered when the user opens an attachment received over email. Since Foiler disregards the sender, spoofing of email "from" addresses has no bearing on Foiler. Foiler has a "Process Filter" that filters the email attachment from launching into the RAM of the computer. Upon attempt to launch or during scanning, whichever is earlier, Foiler validates the said attachment. If the validation returns a positive, Foiler prevents the file(s) from launching into the RAM and also removes the said attachment from the hard disk, while generating a warning to the user.

3 of 4

Foiler Features At a Glance Protects From Technologies Presently Available Foiler


Prevents even a single victim Effective protection from Spear Phishing / Whaling Known entity Age of Technology Technologies invented Contemporary several years / decades technology ago Malware / IP needs to Local computer is be the known entity the known entity. All malware and phishing sites are identified in their unknown state, by using events on the local Protection commences computer Total protection AFTER significant damage is done CPU Usage with zero damage of any user

Hacking through IP Database , once Phishing IP is found to be a Phishing IP Spear Phishing / User Training Whaling

Form based Often does not Protects against Phishing / Spear protect against Form Form based Phishing based Phishing / Phishing / Spear Spear Phishing, unless Phishing IP is a known Phishing IP Cyber Espionage Does not protect against Cyber Espionage Protects against Cyber Espionage

Protection

Significant CPU usage 0% to 5% CPU Usage

User Dependency Dependant on User Independent of feedback of Damage any User done Determination Updates Requires continuous update of server No updates required

Presently, detection of malware is primarily based on "signatures" or "behavior", hence there can never be effective protection from hacking through Phishing / Spear Phishing. That is because any reactive technology needs damage to happen first, before protection can commence.

Foiler is designed to work alongside any security system that you have in place, while effectively bridging the security gap caused by reactive technologies on the one hand and dependence on the individual on the other. Foiler provides a preventive protection as the speed with which new threats are created outstrips the capacity for traditional reactive methods to offer an adequate response. Identification of a Phishing IP by any method / unnatural network traffic is also reactive and needs damage to happen first. The burden of security can never shift to the user, no matter however small in proportion. Foiler protects itself: Foiler protects itself and its supporting files and database. So any application not related to Foiler cannot modify or delete Foilers files.

Current Operating Systems Supported


Foiler is available for the following Operating systems: - Windows XP, Windows Vista and Windows 7.

4 of 4

You might also like