F5-Protect utilizes intelligent monitoring to instantly identify when either internal or external connections indicate an attack is in progress. F5-Protect makes no assumptions about the nature of compromise or attack.
Fremont, CA: HelmCyber, pioneering encryption visibility and digital certificate analytics for cloud and on-premises, came out of stealth with the announcement of the general availability of F5-Protect software to immediately and continuously identify indicators of compromise resulting from the F5 Big-IP vulnerability. This free of cost enterprise subscription software operates non-invasively as a self-contained virtual appliance.
• F5-Protect was designed particularly to pinpoint all systems behaving abnormally as a result of the F5 Big-IP TMUI vulnerability (CVE-2020-5902). This ability is very helpful and time saving for incident response (IR) and to know when malicious users have returned to exploit previously compromised systems.
• F5-Protect utilizes intelligent monitoring to instantly identify when either internal or external connections indicate an attack is in progress. F5-Protect makes no assumptions about the nature of compromise or attack. Instead, it detects solely on the basis of the resulting information, which cannot be hidden.
• Alerts provided are well-detailed and identify specific hosts and the protocols they are using to communicate with customers' F5 Big-IP abnormally.
• If customers choose to upgrade, they can get visibility into their Digital Certificate information (on-premise or cloud), which is also at risk with the F5 Vulnerability. A seamless upgrade offers further indictors of compromise with internal or external digital certificates.
"We developed the F5-Protect enterprise software as a free subscription version of our encryption visibility and digital certificate analytics platform. The functionality in this free version is targeted specifically to the F5 TMUI vulnerability. The critical flaw is trivial to exploit with a simple browser URL and could lead to complete system compromise. CISOs are rightfully concerned that once they've patched their F5 Big-IP systems that they may still be at risk if their systems had already been compromised," said Brett Helm, CEO and Chairman of HelmCyber.