Detect web-app hackers
LONG BEFORE THEY ATTACK
by profılıng theır recon on your app!
Introducing “WEB-APP Recon detectıon”
StrixEye analyzes all visitors of your web-app (monolith websites & APIs), profile suspicious flows of unsuspicious requests, classify suspects and conduct risk-scoring. This architecture lets you gain insights from potential hackers’ point of view. “Web-app recon detection” introduces a methodology which enables predicting business-logic & 0-day attacks.
StrixEye has a built-in WAF and can be integrated to several technologies including team management platforms, WAFs, firewalls, SIEMs & SOARs. These capabilities enable notifying security teams, challenging suspicious visitors, blocking high-risk profiles based on their risk-scores.
Steps of StrixEye’s Operating Principles
![Analysis](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-5.png)
Analysis
Analyzes every HTTP/HTTPS request chain of your each visitor using smart flow-checks.
![Classification & Profiling](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-9.png)
Classification & Profiling
Classifies suspicious users, and profiles their behavior step-by-step.
![Risk Scoring](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-10.png)
Risk Scoring
Conducts risk-scoring based on the suspects’ behavior.
![Notification](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-8.png)
Notification
Notifies your security team when a suspect’s risk-score reaches your pre-defined levels.
![Protection](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-7.png)
Protection
Allows generating automated rules for your WAFs and firewalls to protect your web-apps.
![Discovery](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-6.png)
Discovery
Helps you discover vulnerabilities, which cause business-logic & 0-day attacks, while being tampered, long before being exploited.
![Discovery](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-6.png)
Discovery
Helps you discover vulnerabilities, which cause business-logic & 0-day attacks, while being tampered, long before being exploited.
![Protection](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-7.png)
Protection
Allows generating automated rules for your WAFs and firewalls to protect your web-apps.
![Analysis](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-5.png)
Analysis
Analyzes every HTTP/HTTPS request chain of your each visitor using smart flow-checks.
![Classification & Profiling](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-9.png)
Classification & Profiling
Classifies suspicious users, and profiles their behavior step-by-step.
![](https://strixeye.com/wp-content/uploads/2021/12/Untitled-1900-x-1080-px-Presentation-16.png)
![Risk Scoring](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-10.png)
Risk Scoring
Conducts risk-scoring based on the suspects’ behavior.
![Notification](https://strixeye.com/wp-content/uploads/2021/10/Untitled-1900-x-1080-px-Presentation-8.png)
Notification
Notifies your security team when a suspect’s risk-score reaches your pre-defined levels.
Integrations
StrixEye has integration capabilities with most popular WAFs, firewalls and team management platforms in order to trigger your pre-defined rules and ensure your security.
![aws-waf](https://strixeye.com/wp-content/uploads/2021/10/waf-removebg-preview.png)
![Cloudflare](https://strixeye.com/wp-content/uploads/2021/10/1200px-Cloudflare-logo-vector.svg.png)
![imperva](https://strixeye.com/wp-content/uploads/2021/10/imperva.png)
![Akamai](https://strixeye.com/wp-content/uploads/2021/10/1200px-Akamai_logo.svg.png)
![Splunk](https://strixeye.com/wp-content/uploads/2021/10/Splunk_logo.png)
![Slack_Technologies](https://strixeye.com/wp-content/uploads/2021/10/1280px-Slack_Technologies_Logo.svg.png)
![webhooks](https://strixeye.com/wp-content/uploads/2021/10/webhooks-metamug.png)
![Jira](https://strixeye.com/wp-content/uploads/2021/10/atlassian-jira-logo-large.png)
![Discord_(software)-Logo.wine](https://strixeye.com/wp-content/uploads/2021/10/Discord_software-Logo.wine_-1.png)
Keep Track With Our Dashboard
![](https://strixeye.com/wp-content/uploads/2021/11/Screenshot_2021-11-04_at_00-38-48_StrixEye_-_Detect_Attackers_Before_They_Attack-768x406.png)
![dashboard-new](https://strixeye.com/wp-content/uploads/2021/11/output-onlinepngtools-1-1024x509.png)
![](https://strixeye.com/wp-content/uploads/2021/11/suspect_behaviour.png)
![](https://strixeye.com/wp-content/uploads/2021/11/agent_success-768x206-1.png)
![](https://strixeye.com/wp-content/uploads/2021/11/suspect_risk_score-300x195.png)
![](https://strixeye.com/wp-content/uploads/2021/11/cloudflare_block-768x77.png)
![](https://strixeye.com/wp-content/uploads/2021/11/integration_create-768x293.png)
![](https://strixeye.com/wp-content/uploads/2021/11/profile_api_token-1024x193.png)
![](https://strixeye.com/wp-content/uploads/2021/11/trigger_rule.png)
![](https://strixeye.com/wp-content/uploads/2021/11/slack_70.png)
Keep Track With Our Dashboard
![](https://strixeye.com/wp-content/uploads/2021/11/Screenshot_2021-11-04_at_00-38-48_StrixEye_-_Detect_Attackers_Before_They_Attack-720x380.png)
![](https://strixeye.com/wp-content/uploads/2021/11/integration_create.png)
![](https://strixeye.com/wp-content/uploads/2021/11/agent_success-1024x275.png)
![](https://strixeye.com/wp-content/uploads/2021/11/suspect_behaviour.png)
![](https://strixeye.com/wp-content/uploads/2021/11/slack_70.png)