Magnus Cloud Announces New Approach to Protect Against Bot-based Cyber Attacks

Magnus Cloud, a Nashville, Tennessee based cyber security company, has announced the general availability of its cloud-based service that would represent a significant breakthrough in defending against the most dangerous Cyber-attacks, including sophisticated bot-based attacks at Layer 7/application layer.

Using a deterministic protocol that can always identify whether a bot is hostile or benign, the service eliminates the intrinsic weakness of signature-based approaches used by most solutions on the market today. With its new approach and algorithm for bot defenses, the cloud solution would represent an effective countermeasure available for bot-based attacks including Account-Validator, Account-Take-Over, and DDoS (Distributed Denial of Service).

ddos-mitigation“This is a fundamentally new and superior approach that eliminates false positives, false negatives, and vulnerability to zero-day exploits,” said David Freese, CEO of Magnus Cloud. “Large retail banks and financial institutions have been ready for years for something better and we are confident this is it.”

Auto-Scaling Technology

Magnus’ cloud solution is based on a cryptographically strong behavioral classification protocol that would correctly distinguish between hostile devices and benign ones 100% of the time. Additionally, Magnus claims that its protocol’s effectiveness is unaffected by extreme polymorphism found in the most aggressive bot attacks. The solution works pre-authentication and requires no PII or access to your private SSL keys. Deployment would be easy, based on a simple web services client.

Magnus absorbs huge bot-based attacks using an adaptive, auto-scaling technology platform. It has been successfully tested against bot armies comprising 20,000 large server-class machines running in data center environments on multiple 10 Gbps (gigabits per second) networks, at hit rates up to 2-million per minute.

For an example of how Magnus Cloud defends against DDoS attacks, you may download a whitepaper at