With over 50,000 websites being hacked on a daily basis, protecting your website from hacks and defacements is even more important in today’s world to maintain your customers’ trust in your application.
Using our powerful and innovative engines, together with the capability to provide real-time alerts, our high-fidelity approach can provide you with a high level of assurance and reliability.
Our Monitor will proactively poll your webpage round the clock to give you greater assurance that your website’s confidentiality, integrity and reputation is intact in front of your customers and partners.
Monitor works well with both on-premise or cloud hosted websites and web applications. We also support any web technology stacks including popular Content Management System (CMS) such as WordPress, Joomla, and Drupal.
Our Monitor can be integrated with our Restorer to provide complete incident response in the unfortunate event of a hack.
Our Monitor has many advanced and patent pending features to provide the most powerful and granular options for websites and web applications. There is no software or hardware installation and all that is required is the URL of your website and the contact personnel.
Analyzes HTML source code (e.g. page title, links and frames) to determine if the webpage has been modified when checked against the baseline version.
Auto-analyses the webpages to identify first and third party files such as images and cascading style sheets(CSS) to check for changes to filenames and contents. The unique linking and checking of third party files are typically not covered by locally installed file integrity solutions.
Our Unique AI Engine runs advanced Natural Language Processing (NLP) models that were trained from >10years of defaced data to classify HTML Text contents for defacements.
Besides code and file checks, our Monitor also renders the webpage as an image to do advanced pixel analysis.
Monitor will check regularly for any changes to the DNS and Whois configurations of the website. Any changes will cause alerts to be sent to the users.
Our monitor can be programmed to monitor important payment pages to prevent card skimming attacks (eg. Magecart) or other forms of payment hijacking.
Our Monitor will check regularly for any change or tampering of the HTTP Headers. This includes checking for Content Security Policy (CSP), HTTP Strict Transport Security (HSTS) on the monitored websites.
Our Monitor can also provide the continuous monitoring of the script inventory from inline, first, second, third and fourth party scripts that will affect the look and functionality of the website or web application.
Our WebOrion® Monitor is available in multiple deployment options to meet Mid-market and Enterprise customer needs. This includes cloud based SaaS subscriptions, on-premise physical appliances or virtual appliances that can be deployed on VMWare, dockers or cloud AMIs.