Malware, phishing - are you really safe?

Are you sure you are safe?

The Internet is a great tool that serves many purposes and allows us to learn, work and have fun is many new ways. Unfortunately due to its design and open nature it’s also a place where malicious people try to make their “business”. They hack websites and make them serve malware and setup phishing sites to trick you into putting your personal date in the hope to steal your identity . The anti-virus software is not able to keep up with those new threats.

If you want to surf the Net safely (whether at home or while you are away, on your mobile, tablet etc.) you need to be all the time vigilant looking out for those threats.


The Solution

Zenected is a cloud based security threat protection service. It’s delivered through a set of pre-configured services. Once a user connects to the Zenected, that user’s network traffic is filtered to keep the bad things out (e.g. phishing sites, malware). The only thing this a user has to configure on the endpoint device (be it a mobile device, a desktop or laptop or IoT device) is your VPN connection. Oh, btw. because you are using VPN, your network traffic is kept secret even if you connect using your favorite coffee store wifi.

All mentioned services are updated every hour with a new set of threat indicators. The feeds are delivered by Perun Works.

Cyber threats? Zenected is the solution

Zenected Threat Defense VPN - Admin Panel

 

Easy to manage and very flexible

Zenected is easy to manage. It uses a web front-end for administrators to manage your instance. An administrator user can:

  • manage Zenected users including adding more admin users
  • blacklist URLs or domain names that you don’t want your users to access
  • whitelist URLs or domain names, that were identified as malicious but you still want your users to be able to get to them
  • review exception requests from users

If you are a Zenected end-user what you will like about it, is:

  • no need to install additional software on your mobile phone, tablet or laptop – Zenected uses standard OS features build-in into all modern systems
  • if you encounter a certain resource blocked by the system, you can request an exception. Each exception is then reviewed by an administrator.

Zenected Community

Whenever you decide to whitelist or blacklist a URL, domain or other resource, your decision will be anonymously shared with Zenected Community.

Zenected backend will crunch the feedback received from our wider Community in order to provide better protection through improved feeds.

No personal data is ever shared or stored.

Zenected Community
 


Zenected Threat Defense VPN

 

Zenected is also on GitHub

 

BlackHat Asia 2017 Arsenal

Where do I start?


We encourage you to take ZENECTED for a test drive.
The easiest way to run ZENECTED is to use it with Amazon Web Services. You can use our install script from GitHub and run it at AWS or at your own server anywhere else. Get started by checking our GitHub page – Zenected on GitHub

Be sure to check our resources webpage with various guides and links to other useful pages.

We love NGOs… If IT is not your thing and you don’t know exactly how to set it up, but would still like to use it – get in contact via . We’ll do our best to help.

If you are responsible for a larger environment please get in contact – we provide support for customized installations.

We are also proud to mention, that we were recognized as part of BlackHat Asia 2017 Arsenal. See more on that here…

Lastly – ZENECTED is FREE for anyone to use. If you like it and would like to become part of the bigger team, please consider making a donation to keep our backend infrastructure running. You can do it through PayPal: https://www.paypal.me/zenected