Contact Us

Is Stealth Security Cool? Gartner Thinks So.

Jun 4, 2018 2:31:00 PM

Last month Gartner announced its list of ‘Cool Vendors in Application and Data Security, 2018’ and highlighted Stealth Security for being innovative, impactful, and intriguing in the application and data security space. It’s a good feeling not only to be recognized for our innovation but also to see the realities and challenges of bot detection and mitigation highlighted by industry thought leaders.

Last month Gartner announced its list of ‘Cool Vendors in Application and Data Security, 2018’ and highlighted Stealth Security for being innovative, impactful, and intriguing in the application and data security space. It’s a good feeling not only to be recognized for our innovation but also to see the realities and challenges of bot detection and mitigation highlighted by industry thought leaders.

In our customers’ environments, we’ve observed bot activity outpacing human traffic. And, of that bot activity, we’ve found that 88% consists of malicious automated attacks and unwanted traffic. Most attacks fall under one of the following categories:

  •      Account take over
  •      Fake account creation
  •      Scraping
  •      Vulnerability scanning
  •      SQL injection

As the report mentions, “Security and risk management (SRM) leaders responsible for application and data security face numerous gaps in their security strategies when relying on traditional security models alone (see "Application and Data Security Primer, 2018"). The consequence of this over reliance is that leaders are left without a proper assessment of the internal and external risks they face. Gartner has observed that SRM leaders focus too much and spend too much on traditional infrastructure defenses, such as firewalls and signature-based prevention mechanisms."

Believe us when we say that’s not as easy to achieve as it sounds.

Traditional Defenses are No Longer Effective for Security

With automated attack tools readily available off-the-shelf and rapidly evolving, IT security teams are realizing quickly that traditional methods are failing to protect a large part of the environment. Earlier approaches are either unwieldy or incapable of protecting IoT devices, APIs, and mobile endpoints, which are popular targets for automated attacks.

APIs, such as OFX, are often left mostly undefended because traditional approaches, such as HTML rewriting and Javascript detection, are unable to defend them. And, the most common ways of defending mobile applications, using SDKs, often come with the tradeoff of application bloat and degraded battery life.

After observing the limitations of first-generation approaches, we were the first vendor in the space to take a server-side, passive detection approach that is better suited to today’s broader diversity of targets and fast-evolving attack methods.

Bot Detection and Mitigation with Stealth Security

Stealth Security continuously monitors all web, mobile, and API traffic, providing real-time visibility and analysis of automated attacks and unwanted traffic, without posing any risk to site availability or increasing latency. If an attack or unusual behavior is detected, our solution performs detailed behavioral analysis and can use policy-based attack mitigation to reduce traffic volume by up to 70 percent.

Our solution was architected with the defense of large enterprises in mind and purpose-built for hybrid and public cloud-based deployments. Zero application integration is required, so companies can defend more than just enterprise web applications. Protection extends to all channels, and our approach is flexible enough to scale horizontally or vertically across the site based on the specific needs of your infrastructure.

This revolutionary new architecture minimizes risk to your infrastructure and is a much more effective defense against automated attacks than earlier techniques. It’s extremely hard for attackers to detect and complements, instead of competing with, your IT organization’s existing security stack.

While it’s exciting to be named a cool vendor, we’re also just as proud of how our customers, some of the largest organizations in the retail and finance spaces, are reaping the benefits of our platform. In many cases, their time to value can be measured in just hours.

Think we can help you too? Contact us to discuss how we can help you reduce unwanted and malicious bot activity today.

Gartner Disclaimer: 

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 Gartner, “Cool Vendors in Application and Data Security” Ayal Tirosh, Neil MacDonald, Jeremy D'Hoinne, Dale Gardner, Pete Shoard, Tricia Phillips, 4 May 2018.

Topics: News