Skip to main content

Components of Programmable Mitigation

image-20250601180549495

  1. Situational Awareness:
    • Delivers real-time visibility into evolving attack patterns, enabling rapid threat identification and response.
    • Key monitoring components:
      • Traffic Profiling: Identifies abnormal request rates, anomalous IP distributions, and protocol exploitation.
      • Business Threat Awareness: Detects atypical transactions and content access patterns indicative of fraud or account takeover.
      • Real-Time Analytics: Displays telemetry data, correlating events across multiple vectors to identify coordinated attacks or multi-stage threats.

  2. Targeted Actions upon Behaviour Patterns:
    • Applies context-aware mitigation strategies in response to detected behavioural anomalies.
    • Components include:
      • Progressive Challenging: Issues escalating challenges (e.g., CAPTCHA, JS validation) based on threat risk scores.
      • PBR (Programmable Behaviour Restriction): Dynamically adjusts rate limits, request redirects, and access controls based on behaviour analysis and client reputation.
      • Targeted Control: Deploys specific response actions such as IP blacklisting, request throttling, or payload sanitization based on identified attack vectors.