NVIS AI
HomePartnerAboutResourcesLoginGet started
  • Welcome
  • Help & support
  • Getting Started
    • Sign up
    • Plan your network
  • Set up Network
    • Add group
    • Add team
    • Add network
  • INSTALL
    • Download
    • Instructions
      • Windows instructions
        • Windows Operational Tests
      • macOS instructions
      • Linux instructions
      • Android Instructions
  • NVIS test network
    • Set up NVIS test network
    • Access NVIS test hosts
    • SWG Proxy Configuration
  • Resources
    • Case studies
      • Alt investments
      • Legal services
      • MSPs
      • Nonprofit
    • NVIS Tech Overview
      • Threat Protection Overview
    • Product sheets
      • NVIS SDP
      • NVIS SWG
    • Implementation
      • Remote desktop
Powered by GitBook
On this page

Was this helpful?

  1. Resources
  2. NVIS Tech Overview

Threat Protection Overview

NVIS AI offers comprehensive threat protection by addressing critical security vulnerabilities that can compromise data integrity, privacy, and system functionality. The platform actively safeguards against various attacks that could lead to unauthorized access, data leaks, or permanent service disruptions. With a focus on maintaining secure communications and protecting sensitive information, NVIS AI helps organizations stay one step ahead of cyber adversaries. Below are the vulnerabilities that NVIS can help safeguard against.

Vulnerability
Description
NVIS AI Protection

TunnelVision Vulnerability

TunnelVision allows attackers to bypass VPN encapsulation and redirect traffic outside the VPN tunnel via DHCP manipulation, leading to data interception by a third-party server. The VPN tunnel remains active, misleading users into thinking they are securely connected while their data is exposed

NVIS AI ensures no traffic leaks outside the VPN tunnel, maintaining data integrity and security

WebRTC Leaks

WebRTC exposes the user’s real IP address, even when using a VPN, through peer-to-peer connections. This leak bypasses VPN encryption and allows third parties to track and identify users despite VPN protection

NVIS AI ensures users remain anonymous and protected from WebRTC-related privacy threats

DNS Cache Snooping

Attackers exploit cached DNS queries to track and profile users, leading to privacy breaches, targeted attacks, and data profiling

NVIS AI prevents this by implementing DNSSEC and restricting unauthorized access to DNS caches

PDOS (Permanent Denial of Service)

PDOS attacks exploit software or hardware vulnerabilities to permanently disable systems, causing lasting damage and requiring costly repairs. These attacks exploit critical weaknesses to corrupt, destroy, or disable components

NVIS AI prevents PDOS attacks through continuous security testing, secure coding practices, and robust hardware and software defense mechanisms

Privilege Escalation

Privilege escalation is a serious security flaw that allows attackers to gain higher-level

access than they are authorized for. This can occur due to unpatched vulnerabilities,

misconfigurations, or weak access controls. Once exploited, attackers can steal

sensitive data, install malware, disable security defenses, or modify system

configurations, potentially gaining full control over the system

NVIS AI enforces strict access controls, continuous monitoring, and real-time

anomaly detection to identify and block unauthorized privilege escalation

attempts before they can cause harm

NVIS AI has significant security advantages vs Centralized VPNs (SSL and IPsec) as shown in the independent test of NVIS AI by Miercom Labs and certified in 2022.

VULNERABILITY ASSESSMENT SUMMARY

TESTED ATTACKS
NVIS AI
IPSEC VPN CLIENT

SURVEILLANCE

✅

FAIL

IP HEADER

✅

FAIL

DDOS

✅

FAIL

PAYLOAD MONITOR

✅

✅

ARP CACHE

✅

FAIL

MAN-IN-THE-MIDDLE

✅

FAIL

ALLEVIATED THREATS

92%

17%

PreviousNVIS Tech OverviewNextProduct sheets

Last updated 2 months ago

Was this helpful?