IPTAP2

Internet Protocol Threat Assessment Program (IP-TAP)

Internet Protocol Threat Assessment Program (IPTAP) acquires threat and risk data specific to an enterprise, utilizing our patented methodologies, to ensure accuracy and appropriateness of data for effective cyber threat risk management.

Internet Protocol Threat Assessment Program captures inbound network traffic and detects and stores attack information.  Placement of the system is external to your organization’s network security perimeter within the DMZ.

With this location, it is important that the system is not compromised; the system is not directly addressable. Quantar patented a methodology in 2002 that enables the system to be managed remotely, without being placed in the position of being attacked.

Other vendors utilize cloud-based application hosting, leaving potential for compromise in a number of ways. Indeed cloud threats are one of the drivers for the need to accurately value cyber threats. For this reason, our back-end systems are NOT connected to your organization’s network directly and constantly.

IPTAP generates temporal profiles of attacks and these are exported in xml file format via fileswap or web for use by n-ORM; PAE or third party applications for inputs of your organization’s actual threat events exposure. CyCalc’s applications and methodologies utilize each organization’s proprietary data in deriving cyber values at risk, combined with other external data.

The IPTAP system does not capture and store the content within packet data, since this can create regulatory compliance and privacy issues – particularly for organizations operating, or servicing, the U.K. and/or E.U. markets.

The output data of IPTAP can also be used for fine-tuning perimeter defences and as historic OpRisk data for audit and compliance.

This website uses cookies and asks your personal data to enhance your browsing experience.