Supplier : PerimeterX
Website: www.perimeterx.com
The price: According to the number of visitors to the site
Points
Productivity 5/5
Characteristics 5/5
Monetary expression 4.5/5
Easy to use 5/5
5/5 in total.
Stop
What’s on your website? PerimeterX Code Defender solves e-commerce problems with a simple but very effective script analysis and a solution to reduce the risk for the customer.
Cybercriminals are always on the lookout for our fears in times of crisis, and you can be sure they won’t affect your business during a coronavirus pandemic and beyond. The figures confirm this, because this year the number of attacks has increased exponentially and it is clear that nothing is sacred.
Organizations that are heavily dependent on e-commerce are exposed to extreme risks as the leakage of customer data, such as MageCard attacks, becomes more frequent and sophisticated. Compliance with data protection rules is not voluntary and, as recently discovered by a global airline, non-compliance is subject to sanctions.
PerimeterX offers a powerful security solution because Code Defender constantly monitors all customer actions on your sites, detects data interception attempts, prevents malicious scripts from filtering data and alerts you in real time. Unlike many competing solutions, it does not rely on cumbersome sandboxes, but uses a lightweight JavaScript sensor embedded in the web pages.
The sensor collects information from customers’ browsers, including all scripting actions, and sends it to the cloud detector for further analysis. The intelligence component goes even further, as the detector uses advanced machine training to determine the threat level and uses out-of-band screening officers to automatically adjust and enforce the rules of the Content Security Policy (CSP) to ensure continuous real-time protection.
Figure 1 : The Code Advocates Portal Dashboard shows you everything you need to know about the scripts running on your website.
PlatformPerimeterX
Besides Code Defender, the PerimeterX package also contains the PerimeterX Bot Defender and PerimeterX Page Defender applications, which are all managed via one web portal. If needed they use the same sensor, detector and JavaScript interpreter, making it easy to expand the Code Defender with additional components if needed.
The use of sensors is a fast process and can be easily integrated into websites using page templates. PerimeterX provides a sensor that can consist of just a few lines of JavaScript code, and the 24/7 SOC commands help when needed.
The sensor collects data on flash memory changes, code injections and search events, memory access, script execution methods and origins, and network communications related to third party domains. It does not collect any data entry information from the user when filling out forms, PII (personal data) or credit card transactions.
All data collection is asynchronous and does not affect the user. Blocking actions are transparent and Enforcer ensures that scripts are allowed to perform legitimate actions, so that customers can continue shopping without knowing that malicious communication is being blocked behind the scenes.
Figure 2 : The analyzer page gives a thorough insight into the actions of the scenario and the people it is trying to communicate with.
Platform Portal
Once your account is assigned, Code Defender creates a custom JavaScript fragment. It can be inserted into all pages of your website, and it is desirable that, if it is not the first script, it is placed as high in HTML as possible.
When web pages are loaded with the sensor, the statistics on the customer side are collected and displayed on the portal dashboard. To create a baseline, PerimeterX recommends running it for a few days to a week or two to get a clear view of all running scripts and actions.
The dashboard provides a detailed inventory of all the scripts that run on web pages – InfoSec commands will love it because they provide layers of information that many people rarely see. Instead of checking the website for all the changes their analysts and marketing teams want to make, they can have this done and have full transparency about all their activities.
The status bar provides information about the risk level of the site and whether the Defender Code is in monitoring or mitigation mode. Scripts that generate alarms are displayed in the high, medium or low risk incident panel, while the adjacent graph shows all incidents over a selected period of time.
Figure 3 : The Defender Code provides full control over all actions and changes performed by users.
Risk analysis and mitigation
Coloured icons indicate the risk level of the scenario, and the list on the dashboard shows the source of the scenario, the identification of the scenario, whether it is a first or a third party, the percentage of users involved when first seen, and information about the manufacturer. When you hover the mouse pointer over the risk icon, a pop-up window appears indicating the reason for the classification, and scripts can be blocked or confirmed directly from the incident report.
Scenario IDs can be selected from the table or event view and a full analysis can be performed. The Analyzer tab gives a full analysis of the scenario and shows what it is trying to do and how often it has been executed.
Scenario analysis is a behavioral table that shows whether an attempt is made to access details such as credit card details, which other scripts are downloaded and with which external domains an attempt is made to communicate. It allows you to easily analyze script code without extensive knowledge, and Code Defender provides thorough advice on how to deal with it.
From there you can confirm the scenario to become part of your behavioral database or block it with a single click. If you select the last option, the Code Defender will initiate the processes for defusing the suspect areas and immediately terminate communication with the suspect areas. This puts an end to the chain and prevents data exfiltration, but the rest of the scenario can proceed normally.
The Defender Code provides for a full audit of all activities, including actions, event calendar and the person responsible for the change. It can be integrated with Slack channels for instant notification of events to the customer, work with event management platforms such as OpsGenie or ServiceNow, and use APIs to export information to your Security Information and Event Management (SIEM) solution.
Figure 4 : The settings page gives you an overview of the Defender Code, where you can see whether the Defender Code is disabled in Surveillance Mode or forcibly muted by the CSP.
Conclusion
Since modern websites contain an enormous amount of third-party code, it is very important that companies, especially those that depend on e-commerce, understand the security implications and reduce the risks. Too many people don’t know what’s happening on their websites, and with the new Magecart and supply chain attacks, they can’t afford to stay in the dark.
PerimeterX Code Defender is an elegant solution to this growing problem by providing full visibility into all scripting activities and rapid risk mitigation through automated execution of CSP rules. It is surprisingly easy to implement, does not require any architectural changes to the site and above all does not affect its usability.
Related Tags:
perimeterx bot defender price,perimeterx reviews,perimeterx bypass