At Phoenix we strive for transparent, fluent & easily understandable solutions.
Our headquarters and management are located in Silicon Valley, our R&Ð is in Europe. We are trying to improve security posture of networks, Kubernetes clusters and endpoints, as well. We will start hiring in Q2 2022.
Not at all. Phoenix is a non-intrusive solution. We created Kubernetes operators, network security solutions (SD-WAN), open source commitments to Red Hat, Gitlab, Sysdig, etc. The bottom line is that you don't need to change anything - not even with the SD-WAN product.
Dependent on the size of the time windows you leave for hackers and the desired complexity (obfuscation, reconfiguration, etc); usually negligible.
At the moment we provide it for Kubernetes environments, NGINX proxies and basically anything software defined (except maybe BGP).
We do not change the operating system at all. Depending on the complexity you need, we can have a solution that changes even binaries.
Phoenix was designed to counter route control, ransomware, defacement (Ddos) attacks in a simple and effective way. We developed an architecture where zero trust and node-based technologies apply. A proper MITRE ATTACK framework is available upon request.
The current infrastructure is working on legacy architecture, where latency is a significant problem. Controlling the route resolution, dependency on trust in authoritative sources are causing hijacking, Ddos and ransomware to be the easiest ways to attack.
Kubernetes is getting very popular with the user and fan community growing. The whole system is complex enough to cause users to make mistakes in configuration. There are lots of vulnerabilities still open and it takes a real expert to navigate through this. We have automated this for you.
Phoenix takes advantage of new technologies - such as Kubernetes, Envoy, F5 NGINX to create its Moving Target Defense play in a fast, scalable and cost-effective way.
Known as MTD, this strategy introduces a dynamic, constantly evolving attack surface across multiple system dimensions. This increases uncertainty for bad actors and complicates their attacks. In the end, hackers can’t attack what they don’t see.
Our technology can protect applications, OS and eventually networks. It is an emerging technology described here: