STAY IN CONTACT
SOCIAL
  • White Facebook Icon
  • linkdin-01
  • White Twitter Icon
  • White Instagram Icon

Performance degradation kills cybersecurity


Being more than 30 years in cyber, I have seen many different cybersecurity solutions. Many tried to implement unique and fresh new approaches to solve big and complicated security problems. Others try to improve the current situation, and some, distrust the entire market with the next cutting-edge solution.  


Security solutions profoundly connect to the infrastructure, from operating systems to "underneath" the hardware. It always requires massive development effort on the 'platform' and infrastructure (every vendor has an 'infrastructure group'). In fact, usually, more development resources are spent on the infrastructure and integration with (so many) other solutions and systems,  than on the security core itself. 

However, one aspect is the most troubling when creating a security solution. It is the performance toll!



Meaning, the performance degradation that the user or the system, will  have to 'pay' in order to keep themselves secure.

Since security solution requires total control of the content it means that usually, it needs to delay it, perform analysis, and only if it checks out- release it. 


So here is the big challenge- In 2018 (and even much earlier) users do not allow for even the smallest of dents in their performance. If they suspect that the solution may add delay, latency or reduce performance, they reject it!

It may well be that other systems cause the delay, but just knowing that the security solution may be "in the way" of the data, is enough to shut it off:

Performance degradation kills the security!


Today, when I am evaluating or developing a new security solution, I demand it be entirely out of band to the traffic. It must use duplicated pipes, other sources of information, work aside independently. Only when it reaches a very high probability observation, it should warn, and if time is a factor for the user's safety, it needs to act accordingly.

 

That is how WifiWall is works

While other WiFi security solution acts as a proxy, meaning that all traffic must go via to be analysis preventing malicious content.  WifiWall is constantly sniffing and listening to the traffic that goes to the protected Station, performing analysis on a side data. No performance degradation since it. If and when it detects an attack, it sends a de-association command to the Station, causing it to disconnect from the WiFi network.


WifiWall does it without having any software on the Station, simply using existing 802.11 protocols :)


That's all for today,

Yours,

Shlomo.

WifiWall's founder and CEO.


Don't Wifi without WifiWall