Performance analysis and network security
We answer the most tricky questions about security and performance
We have been developing network security software since 2008. We know a lot about network security and we provide consulting services in the area.
Read about our performance analyzing consulting for G-Core Labs.
Performance analysis
Typical engadgements of our performance consulting team may include, but not limited by:
Mathematical modeling of how the analyzed system will behave on larger scale, different workload or using different hardware.
Deep system analysis discovering rare performance issues, e.g. tail latencies or degradation under peak loads.
Designing a system architecture to beat the best performance results of the competing products.
Careful analyzing of production systems not affecting their availability and performance.
Testimonials
Clutch.co publishes verified reviews conducted by independent analysts. Read the unbiased reviews about our work.
Network security
We have been developing network security software since 2008. During these years we have delivered tens of projects using various open source software and made deep changes and wide extensions of the software. We know a lot about network security and we provide consulting services in the area.
DDoS protection
Being developers of Tempesta FW, an HTTPS reverse proxy with advanced application layer (L7) DDoS mitigation features, we know a lot about the modern DDoS attacks and the state-of-the-art DDoS protection open source projects.
To protect you against L7 DDoS attacks we properly tune your web stack and the operating system, set up the most suitable open source solutions, provide you handy scripts for the logs analyzing and requests classification. We guide you how to deploy a cheap CDN-alternative solution using inexpensive public clouds to mitigate volumetric DDoS attacks.
Read about the case of our consulting of a web hosting company in application layer DDoS mitigation.
Application security
We developed the core of a WAF mentioned in the Gartner magic quadrant 2015. Wallarm commissioned us development of their open source SQL detection library (read more about the case). We also develop Tempesta FW, an open source WAF accelerator.
With the significant background in the field We can help you to set up and properly tune ModSecurity, NAXSI, Suricata, Zeek, and other open source network security software to build a solid protection of your web site.
Cryptography
Our engineers developed and optimized performance of several VPN products based on the IPsec and IKE protocols. During our work on Tempesta TLS we improved the original mbed TLS performance for more than 40 times and reported a side channel attack vulnerability for the WolfSSL library. Tempesta TLS outperforms OpenSSL for more than 80% and provides up to 4 times lower latency.
Our expertise can be beneficial in blockchain VPN, TLS, and other projects dealing with cryptography.
Security assessment
Experienced hackers can break even very carefully developed and administered systems, so security assessment performed by external experts reveals vulnerabilities that eluded the development team’s eyes. Our experts reveal vulnerabilities in web applications, Linux/Unix networked systems and C/C++ source code.
How we work
We start from the discussion of the issues and targets and what we need from your side to launch the projects, signing the NDA and the contract.
The actual analysis is started and we provide you daily or bidaily status updates via email or messenger like Slack. Typically we use Google Docs for the analysis report, which is also updated several times per week.
When the investigations are finished we discuss the report and you can request additional research. We finish the consulting assignments with precise recommendations on how to fix the security of performance issues.
Why us?
Consulting projects require outstanding expertise, so only principal and fellow engineers of our team perform the assignments. The average experience of the experts is 15-20 years in the high performance and security areas.
As the developers of tens of high-performance network security products, we know many performance and security gotchas.
Typically we work on an hourly basis, but our typical contract and frequent status updates allow you to cancel the project quickly if you’re not happy with the progress.
Kinescope
Core Sound Imaging
NetActuate
G-Core Labs
Jet Infosystems
GalleryMedia
WolfSSL
Masterhost