Frequently Asked Questions

Frequently Asked Questions

At Phoenix we strive for transparent, fluent & easily understandable solutions.

 

Title-mark-blue-2

Where are you located and how can I join?

Where are you located and how can I join?

Our headquarters and management are located in Silicon Valley, our R&Ð is in Europe. We are trying to improve security posture of networks, Kubernetes clusters and endpoints, as well. We will start hiring in Q2 2022.

Title-mark-blue-2

Do I need to change my infrastructure to use Phoenix?

Not at all. Phoenix is a non-intrusive solution. We created Kubernetes operators, network security solutions (SD-WAN), open source commitments to Red Hat, Gitlab, Sysdig, etc. The bottom line is that you don't need to change anything - not even with the SD-WAN product.

Title-mark-blue-2

What is the performance overhead of your technology?

Dependent on the size of the time windows you leave for hackers and the desired complexity (obfuscation, reconfiguration, etc); usually negligible.

Title-mark-blue-2

What kind of applications can we use Phoenix for?

At the moment we provide it for Kubernetes environments, NGINX proxies and basically anything software defined (except maybe BGP).

Title-mark-blue-2

Do you change the operating system or applications binary?

We do not change the operating system at all. Depending on the complexity you need, we can have a solution that changes even binaries.

Title-mark-blue-2

What specific problems does Phoenix solve?

Phoenix was designed to counter route control, ransomware, defacement (Ddos) attacks in a simple and effective way. We developed an architecture where zero trust and node-based technologies apply. A proper MITRE ATTACK framework is available upon request.

Title-mark-blue-2

What is the problem with existing SDN infrastructure?

The current infrastructure is working on legacy architecture, where latency is a significant problem. Controlling the route resolution, dependency on trust in authoritative sources are causing hijacking, Ddos and ransomware to be the easiest ways to attack.

Title-mark-blue-2

What is the problem with existing Kubernetes infrastructure?

Kubernetes is getting very popular with the user and fan community growing. The whole system is complex enough to cause users to make mistakes in configuration. There are lots of vulnerabilities still open and it takes a real expert to navigate through this. We have automated this for you.

Title-mark-blue-2

What underlying technology do you use?

Phoenix takes advantage of new technologies - such as Kubernetes, Envoy, F5 NGINX  to create its Moving Target Defense play in a fast, scalable and cost-effective way.

Title-mark-blue-2

What is moving target defense?

Known as MTD, this strategy introduces a dynamic, constantly evolving attack surface across multiple system dimensions. This increases uncertainty for bad actors and complicates their attacks. In the end, hackers can’t attack what they don’t see.

Title-mark-blue-2

Okay, okay… but where do we fit into the classic Gartner categories?

Our technology can protect applications, OS and eventually networks. It is an emerging technology described here:

https://gtnr.it/3IGdg69

Phoenix-Logo-White

© 2021-2022 R6 Security Inc.

© 2019 R6Security

Follow us!

Follow us