BitNinja uses two-level caching: it stores the results of the malware analysis in memory and a database cache. We also use the latest techniques to reduce resource usage: Audit file monitoring and Aho-Corasick algorithms.
Traditional malware detection techniques can’t find obfuscated malware, but BitNinja has a disruptive innovation to fight against these onfected files. We read the code structure and even deobfuscate the code to find hidden malware.
In the DoS Detection module the default threshold guarantees the low false positive rate. The WAF have pre-defined ruleset for this purpose, and in the IP reputation module, the greylist makes the IP management more flexible and provides a more convenient way to handle false positives.
IP addresses on our reputation list
Global blacklisted malware signatures
BitNinja has unique signatures based on the malware’s structure. If a hacker rewrites a malware with the original structure, our malware engine detects it. This way, BitNinja can identify obfuscated malware and zero-day attacks instantly. It is combined with the Defense Robot, which traces the backdoors used to infect your servers, to prevent future attacks.
BitNinja can handle both TTLs and ASNs. The WAF 2.0 is highly customizable so you can minimize your false-positive rate and you can even configure the filter level by domain. We are constantly creating new WAF rules to patch the different zero-day CMS vulnerabilities.
Every BitNinja protected server worldwide shares information with each other about the most recent attacks. That’s why we can use a rich set of common malicious IP databases in our ecosystem and have information about 100,000,000 IP addresses.
Our first defense line for identifying botnets is the Browser Integrity Check. If the automatic validation is not successfull then we use the CAPTCHA page. We also have URL Captcha that can defend against unpatched zero-day attacks efficiently and quickly!
BitNinja is designed to manage and the display security of a server cluster and we have a dedicated security console for it. If you have to handle more servers at the same time, you will love it!
The Console is designed to be easy to use as possible and have the most important information visible at a glance. A good example for this is our Server Card. You can see the key details of the server and turn on or off its modules by two clicks.
"Outdated WordPress installs and plugins caused the most grief, leading to malware and phishing files on customer accounts. The reason for this is largely due to the growing sophistication of the attacks, making them increasingly difficult to detect. To fix this, we tried integrating Patchman on our servers. As opposed to Patchman, BitNinja does more than virtual-patch known CMS vulnerabilities. ”
"After we started using BitNinja, we have noticed a drastic decrease in hacked WordPress installations or server overloads due to minor DoS attacks or brute force attempts. The drop was so dramatic that we decided to provide BitNinja for free to our web hosting customers. ”
"The results are amazing: we don’t get any more complaints from customers our IT engineers’ work load has
been reduced, servers are using less resources and
uptime has also improved."
“Before using BitNinja we got at least 4 or 5 customer
complaints every day about their sites or emails being hacked. Now that number has
reduced to 2 or 3 per month.”
Security as a Service Solution
Disruptor Company of the year
Firewall of the year
Security Innovation of the year
Excellence in Customer Service
Security Solution of the year
Innovative Product of the year
Widen your cybersecurity knowledge with BitNinja articles, webinars and more.
Everything you need to know about BitNinja products.
Contact our Ninjas for help.
Use our materials to maximize your profit from reselling.
Start the 7-day free trial with full functionality without spending a cent.