
CleanINTERNET®

Click to visit website
About
Centripetal offers CleanINTERNET®, an intelligence-powered cybersecurity solution. It uses high-performance computing, patented algorithms, and security analysts for proactive threat prevention. Deployment involves installing RuleGATE® at the network edge. A trial involves data collection, reporting on advanced threats detected, and analyst threat hunting. CleanINTERNET® addresses limitations of firewalls in operationalizing threat intelligence by providing the scale, dynamic updates, and contextual analysis necessary for effective protection. It's not an IDS/IPS, MDR, MSSP, TIP, XDR/NDR, or ASM, but it complements these technologies by proactively preventing threats and reducing the attack surface. Centripetal is also hiring for various roles, including cybersecurity analysts, software engineers, and marketing positions.
Platform
Task
Features
• threat intelligence
• proactive defense
• rulegate®
• security analysts
• patented software algorithms
• high performance computing
FAQs
What is CleanINTERNET®?
CleanINTERNET® is an intelligence-powered security solution using high performance computing technology, patented software algorithms and uniquely skilled security analysts to deliver a robust alternative protection strategy at significantly lower cost. CleanINTERNET® presents an alternative approach to cybersecurity, putting threat intelligence at the forefront, moving from reactive to proactive defense, and helping security teams be more efficient and effective.
How is CleanINTERNET® deployed?
The first step in deployment of CleanINTERNET® is deployment of our RuleGATE®. This is installed at your network edge between the ISP and the firewall. This only takes as long as the time for you to rack, power and cable the RuleGATE®. While this varies, it typically takes less than 45 minutes. It is installed with zero impact on your network traffic. It is set up with an external management port as well as a network tap which provides visibility of network traffic inside the firewall. Once activated, the RuleGATE® will be registered and visible to the CleanINTERNET® service, monitoring and shielding traffic according to the implemented policy. It will highlight traffic to be assessed and evaluated by our Security Operations team.
What happens during a trial?
During the first 7 days we typically collect data, and focus on monitoring your network traffic rather than shielding. We then present you with your first report updating you on the activity on your network. This report covers Advanced Threats Detected, or ATDs, which showcases the malicious activity that is occurring in your network. You will then receive a report each week for the following three weeks. Throughout this entire time an Intelligence Operations Analyst will be actively threat hunting in your environment, confirming findings of hostile activity, and providing recommendations and guidance on how to further increase protection. As the trial proceeds, additional shielding policies can be put in place which will immediately protect your network from known threats and cyberattacks.
Why can’t threat intelligence be operationalized in my firewall?
To leverage all available data for indicators of compromise (IOCs) it requires far more processing power than is technologically possible. Firewalls can handle less than 1% of currently available high fidelity intelligence. Our Threat Intelligence Gateway, the RuleGate®, employs thousands of feeds constituting billions of risk normalized IOCs.
Is CleanINTERNET® an IDS/IPS?
An Intrusion Detection System (IDS) uses signature-based detection to identify malware on the wire. It can trigger a security incident and can be an important indicator of an attack in progress. An Intrusion Protection System (IPS) sits inline in the network and can block the attack at point of ingress. However, most IPS systems are not sufficiently powered to be able to handle a full network load without introducing latency. CleanINTERNET® uses IDS functionality to perform a secondary inspection on traffic deemed suspicious, but not necessarily shielded initially. This can be used to provide immediate feedback to the user and to intelligence analysts, indicating that the traffic is in fact malicious and should be shielded. Immediate changes to the policy can then be applied.
Is CleanINTERNET® an MDR?
Managed Detection and Response (MDR) is principally a forensic activity that happens after a high risk event has already occurred. The power of threat intelligence is being able to act before an event happens. CleanINTERNET® is a proactive approach that leverages intelligence to proactively prevent high risk events. As more threats are prevented, the downstream burden on every tool, process, and human is reduced – optimizing people, process and posture.
Is CleanINTERNET® an MSSP?
Many enterprises are wisely choosing to outsource their security monitoring and response needs to specialist security service providers. It is not feasible for many smaller companies to build up the skill sets, tools, and processes required to implement a comprehensive cybersecurity defense. CleanINTERNET® can implement or augment a Managed Security Service Provider (MSSP) capability for small and medium enterprises, acting as the Security Operations Center (SOC) or working alongside customer or partner IT resources – driving targeted remediation and risk reduction.
Is CleanINTERNET® a Threat Intelligence Gateway (TIG)?
Threat Intelligence Gateway’s provide blocking of known threats at the network perimeter based on reputation. CleanINTERNET®’s RuleGATE® provides TIG functionality, but it is important to recognize the unique capabilities of Centripetal’s Threat Intelligence interpretation and processing. This includes the massive processing capability of the RuleGATE® hardware and software, and the additional oversight and guidance provided by Centripetal’s Intelligence Operations Analysts. As a managed service, CleanINTERNET® combines intelligence, technology, processes and skills together to redefine the category of Threat Intelligence Gateway’s.
Is CleanINTERNET® a Threat Intelligence Platform (TIP)?
A typical threat intelligence platform ingests information from one or more providers, usually open source or a proprietary source, and provides tools to sort and search the data. These are used by SOC analysts as a tool to aid in the threat hunting process. CleanINTERNET® aggregates the widest set of sources of threat intelligence, consolidating them into an unmatched high-fidelity feed of threat intelligence that is used to power the CIeanINTERNET® Threat Intelligence Gateway, the RuleGate®. CleanINTERNET® operationalizes and automates this superset of threat intelligence unique to the industry.
Is CleanINTERNET® an XDR/NDR?
Network Detection and Response (NDR) is an increasingly popular technology fitting into the XDR category, focused on gathering information about behavior in the network. EDR focuses on Endpoints, and NDR on the network traffic between all entities. These tools typically feed into an SIEM which is used to correlate these events, interpret the behavior, and aid the threat analyst in identifying malicious traffic. This process is both data heavy and dependent on advanced skill sets. While the largest enterprises are seeing value in this technology, it is less clear that it is applicable across organizations of all sizes. Ultimately, an NDR is a luxury that most enterprises will see limited value in. An alternative approach is to eliminate or significantly reduce the malicious traffic entering the network in the first place. By implementing a secure first line of defense using CleanINTERNET®, you will see reduced resourcing requirements in threat hunting and security operations.
Is CleanINTERNET® an ASM?
Typically, a Cyber Asset Attack Surface Management tool catalogs and monitors all assets in the enterprise, minimizes the attack surface, and gives the adversary as little information about the security posture of the business as possible. Because CleanINTERNET® shields the network from reconnaissance traffic from known bad actors, it also reduces the visible attack surface, effectively hiding the assets from adversaries.
Does any potential personally identifiable information (PII) leave my organization?
We do not rely on or take out any personally identifiable information from your network. The information we act on is publicly available addressing information that is already visible on the internet. If an event warrants payload analysis through internal packet capture (PCAP) collection, that information is contained within your network and is not accessible to us without your consent. This is a common concern and thus we’ve designed our systems and services explicitly to preserve privacy.
Job Opportunities
There are currently no job postings for this AI tool.
Ratings & Reviews
No ratings available yet. Be the first to rate this tool!
Alternatives
Armis
Armis provides an agentless platform for real-time cyber exposure management, protecting all assets and mitigating risks.
View Details
Censornet
Censornet is an AI-powered cybersecurity platform offering integrated email, web, and cloud application security, along with advanced threat prevention and data loss prevention.
View Details
Andesite AI
Andesite AI's platform uses AI to supercharge cybersecurity analysts, enabling faster threat response and efficient data analysis.
View DetailsAI EdgeLabs
AI-powered cybersecurity platform for edge and IoT environments, providing threat detection, prevention, and automated response.
View DetailsStreamScan
StreamScan provides AI-powered cybersecurity solutions, including MDR, incident response, and CMMC support, with 24/7 monitoring and expert assistance.
View DetailsFeatured Tools
Songmeaning
Songmeaning uses AI to reveal the stories and meanings behind song lyrics. It offers lyric translation and AI music generation.
View DetailsWhisper Notes
Offline AI speech-to-text transcription app using Whisper AI. Supports 80+ languages, audio file import, and offers lifetime access with a one-time purchase. Available for iOS and macOS.
View DetailsGitGab
Connects Github repos and local files to AI models (ChatGPT, Claude, Gemini) for coding tasks like implementing features, finding bugs, writing docs, and optimization.
View Details
nuptials.ai
nuptials.ai is an AI wedding planning partner, offering timeline planning, budget optimization, vendor matching, and a 24/7 planning assistant to help plan your perfect day.
View DetailsMake-A-Craft
Make-A-Craft helps you discover craft ideas tailored to your child's age and interests, using materials you already have at home.
View Details
Pixelfox AI
Free online AI photo editor with comprehensive tools for image, face/body, and text. Features include background/object removal, upscaling, face swap, and AI image generation. No sign-up needed, unlimited use for free, fast results.
View Details
Smart Cookie Trivia
Smart Cookie Trivia is a platform offering a wide variety of trivia questions across numerous categories to help users play trivia, explore different topics, and expand their knowledge.
View Details
Code2Docs
AI-powered code documentation generator. Integrates with GitHub. Automates creation of usage guides, API docs, and testing instructions.
View Details