{"id":465,"date":"2022-12-08T21:54:37","date_gmt":"2022-12-08T21:54:37","guid":{"rendered":"https:\/\/cryptomage.com\/co-nas-odroznia\/"},"modified":"2023-12-06T11:02:47","modified_gmt":"2023-12-06T11:02:47","slug":"home","status":"publish","type":"page","link":"https:\/\/cryptomage.com\/en\/","title":{"rendered":"What makes us different"},"content":{"rendered":"<p>Cryptomage Cyber Eye\u2122\u00a0offers unique approach to network traffic analysis, with a combination of protocol behavior, packet analysis, and host communications behavior analysis. While most security solutions focus only on user and host behavior,\u00a0Cryptomage Cyber Eye\u2122 also incorporates unusual low-level network behavior.<\/p>\n<p>This way, the solution analyzes network protocol and host activity with our groundbreaking network steganography expertise. This includes the detection and prevention of unknown or hidden network traffic, communication, and information\/data, such as when a TCP\/IP protocol has been intentionally modified to allow illegal botnet operations to occur.<\/p>\n<p>While\u00a0Cryptomage Cyber Eye\u2122\u00a0is constantly evolving, armed with AI and machine learning capabilities, it is also designed to integrate and interact with other security solutions to increase threat detection. This means you can combine our unique network analysis capabilities with other security tools to achieve even greater levels of threat detection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptomage Cyber Eye\u2122\u00a0offers unique approach to network traffic analysis, with a combination of protocol behavior, packet analysis, and host communications behavior analysis. While most security solutions focus only on user and host behavior,\u00a0Cryptomage Cyber Eye\u2122 also incorporates unusual low-level network behavior. This way, the solution analyzes network protocol and host activity with our groundbreaking network steganography expertise. This includes the detection and prevention of unknown or hidden network traffic, communication, and information\/data, such as when a TCP\/IP protocol has been intentionally modified to allow illegal botnet operations to occur. While\u00a0Cryptomage Cyber Eye\u2122\u00a0is constantly evolving, armed with [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":414,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"home.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-465","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/pages\/465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":22,"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/pages\/465\/revisions"}],"predecessor-version":[{"id":1365,"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/pages\/465\/revisions\/1365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cryptomage.com\/en\/wp-json\/wp\/v2\/media?parent=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}