Company type | Private Company |
---|---|
Industry | Software, Information Technology |
Predecessor | Perfecto Technologies |
Founded | 1997 |
Founder | Gili Raanan and Eran Reshef |
Defunct | 2006 |
Fate | Acquired |
Successor | IBM |
Headquarters | Herzliya, Israel, |
Products | AppShield and AppScan |
Website | www.IBM.com |
Sanctum was a Santa Clara, California-based information technology company focused on application security. Sanctum offered a firewall, AppShield, and scanner, AppScan, for application-layer security for Web environments. [1]
In 2003 Sanctum was merged with Watchfire and the company was subsequently acquired by IBM. [2]
Sanctum was founded in 1997 as Perfecto Technologies, by Eran Reshef and Gili Raanan.
The company released its first product AppShield in summer of 1999. [3]
The company has done an extensive research in application security and applying formal methods to real life software [4] in collaboration with Turing Award winner Professor Amir Penueli. Early research in 1996 and 1997 led to the invention, in parallel to other teams, of CAPTCHA technology, and the application for a US patent for CAPTCHA. [5]
In 2000 the company renamed itself to Sanctum. [6] The company was backed by investors Sequoia Capital, Intel Capital, Goldman Sachs, DLJ, Walden and Mofet. [7]
The AppShield product was an early Web application Firewall. [8]
Later in June 2000 the company introduced AppScan the world's first Web Security Vulnerability Assessment solution. [9] Among the first clients for AppScan were Yahoo!, [10] Bank of America and AT&T. [11]
An exploit is a method or piece of code that takes advantage of vulnerabilities in software, applications, networks, operating systems, or hardware, typically for malicious purposes. The term "exploit" derives from the English verb "to exploit," meaning "to use something to one’s own advantage." Exploits are designed to identify flaws, bypass security measures, gain unauthorized access to systems, take control of systems, install malware, or steal sensitive data. While an exploit by itself may not be a malware, it serves as a vehicle for delivering malicious software by breaching security controls.
Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems (Sun) in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call system. NFS is an open IETF standard defined in a Request for Comments (RFC), allowing anyone to implement the protocol.
Instant messaging (IM) technology is a type of synchronous computer-mediated communication involving the immediate (real-time) transmission of messages between two or more parties over the Internet or another computer network. Originally involving simple text message exchanges, modern IM applications and services tend to also feature the exchange of multimedia, emojis, file transfer, VoIP, and video chat capabilities.
Internet Security Systems, Inc., often known simply as ISS or ISSX, was a provider of security software and managed security services. It provided software and services for computers, servers, networks, and remote locations that involve preemptive security against threats before they affect a business. Founded in 1994, the company was acquired by IBM in 2006.
Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.
Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.
An application firewall is a form of firewall that controls input/output or system calls of an application or service. It operates by monitoring and blocking communications based on a configured policy, generally with predefined rule sets to choose from. The two primary categories of application firewalls are network-based and host-based.
Microsoft Defender Antivirus is an antivirus software component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP and was shipped with Windows Vista and Windows 7. It has evolved into a full antivirus program, replacing Microsoft Security Essentials in Windows 8 or later versions.
Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.
Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services.
Ericom Software, Inc. is a Closter, New Jersey–based company that provides web isolation and remote application access software to businesses.
A virtual security appliance is a computer appliance that runs inside virtual environments. It is called an appliance because it is pre-packaged with a hardened operating system and a security application and runs on a virtualized hardware. The hardware is virtualized using hypervisor technology delivered by companies such as VMware, Citrix and Microsoft. The security application may vary depending on the particular network security vendor. Some vendors such as Reflex Systems have chosen to deliver Intrusion Prevention technology as a Virtualized Appliance, or as a multifunctional server vulnerability shield delivered by Blue Lane. The type of security technology is irrelevant when it comes to the definition of a Virtual Security Appliance and is more relevant when it comes to the performance levels achieved when deploying various types of security as a virtual security appliance. Other issues include visibility into the hypervisor and the virtual network that runs inside.
WaveMaker is a Java-based low-code development platform designed for building software applications and platforms. The company, WaveMaker Inc., is based in Mountain View, California. The platform is intended to assist enterprises in speeding up their application development and IT modernization initiatives through low-code capabilities. Additionally, for independent software vendors (ISVs), WaveMaker serves as a customizable low-code component that integrates into their products.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.
Tufin is a security policy management company founded in 2005 that specializes in the automation of security policy changes across hybrid platforms and security and compliance. The Tufin Orchestration Suite supports next-generation firewalls, network layer firewalls, routers, network switches, load balancers, web proxies, private and public cloud platforms and micro-services.
HCL AppScan is a family of desktop and web security testing and monitoring tools, formerly a part of the Rational Software division of IBM. In July 2019, the product was acquired by HCLTech and is currently marketed under HCLSoftware, a product development division of HCLTech.
Gili Raanan is an Israeli venture capitalist and former founder of multiple software companies. Raanan started Sanctum in 1997, the company that created the Web application firewall AppShield and the web application penetration testing software AppScan. He later started NLayers which was acquired by EMC Corporation. He was a general partner at Sequoia Capital, the founder of Cyberstarts, and board member at Wiz, Adallom, Onavo, and Moovit, Snaptu.
AppShield was an early Web application Firewall. AppShield was conceptualized by Eran Reshef and Gili Raanan and was introduced to the market by Perfecto Technologies in the summer of 1999. AppShield worked by inspecting incoming HTTP requests and blocking malicious attacks based on a dynamic policy which was composed by analyzing the outgoing HTML pages. A 2002 ZDNet article noted that in the three years following its launch, it had been used by 60 Fortune 100 companies.
Eilon Solan is an Israeli mathematician and professor at the School of Mathematical Sciences of Tel Aviv University. His research focuses on game theory, stochastic processes, and measure theory.