Skip to Main Content

Privafy cited as “innovative network supplier” among industry giants. Read it in SearchNetworking.

Contact Sales Login
Explore New Features
A Complete & Growing Menu of Cloud-Based Services
Privafy delivers — today’s most complete protection against cyber attacks. By integrating full-stack security functionality into a suite of cloud-native services, we’re able to safeguard your Data-in-Motion within all business environments — at a fraction of the cost of legacy solutions.

Advanced, Patented Technologies Included

Privafy protection also includes advanced, proprietary technologies that aren’t available anywhere else. For example, our Absolute Encryption™ schema defends against “man-in-the-middle” or unauthorized snooping attacks. Patented endpoint identity protection guards against endpoint cloning. And our new Impervious Firewall™ technology delivers dynamic perimeter security with fine-grain rules for inbound and outbound control, plus deep content inspection for data loss prevention and comprehensive malware screening.

Check Out Our Full Feature List!

The capabilities shown below are available now, or coming very soon. Check back regularly to see what new features we’ve added.

  • Non-degrading encryption at line rate:
    • Encryption of peer-to-peer communication without causing any line rate performance degradation
  • Privafy proprietary concurrent multi-key encryption:
    • Use of multiple keys for encrypting peer-to-peer connections
  • Zero-Touch Encryption Key Management:
    • Cloud based key management with no human intervention
  • Key Management using hyperledger:
    • Hyperledger Block chaining based security key generation and storage
  • Intelligent high frequency encryption key rotation:
    • Automated key rotation at high frequency to reduce the amount of content encrypted using that
  • Privafy Standard Website and Destination Access Control
    • Web classification and reputation:
      • Web classification and reputation based control of outgoing traffic
    • IP reputation:
      • IP reputation (malware etc) based control of outgoing traffic
    • Anti-phishing:
      • Prevent outgoing traffic to sites that attempt phishing
  • Site and destination access control through DNS Filtering
  • Traffic flow monitoring and policy enforcement, intelligent DNS
    • Geography:
      • Security policy enforcement and traffic filtering based on geography accessed
    • URL Filtering:
      • Traffic filtering based on URL accessed
    • Destination IP address:
      • Traffic filtering based on Destination IP address
    • Protocols and Ports*:
      • Traffic filtering based on standard protocols such as ICMP/SMTP etc, or ports accessed
  • Malicious URL steering (add-on):
    • Block traffic going towards malicious URLs and steer towards a configured destination instead
  • ML-based outlier detection (add-on):
    • Machine learning based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
  • AI integration ready (add-on):
    • Supports visibility and control interfaces to integrate with AI based systems for dynamic policy control
  • Standard Privafy dictionaries:
    • Data loss prevention by detecting any anomalous data transfer using standard rules and dictionaries
    • Traffic filtering by application accessed
    • Traffic filtering by file type accessed
  • Customer supplied policies (add-on):
    • Data loss prevention by detecting any anomalous data transfer using customer dictionaries
  • AI-based traffic flow anomaly detection:
    • Data loss prevention using Machine learning driven dynamic updates to rules based on behavioral analysis of the customer traffic
  • Visibility into Public/ private cloud access
    and SaaS

    • Device Based:
      • Visibility into Cloud Services access per device
    • Location Based:
      • Visibility into Cloud Services access per location
    • User Based*:
      • Visibility into Cloud Services access per user
  • Data Security:
    • DLP*/Data loss prevention
  • Threat Protection
    • Standard based on Privafy selected threat databases:
      • Intrusion detection for inbound access from malicious sources using standard Privafy dictionaries
    • Customer selected threat databases (add-on):
      • Intrusion detection for inbound access from malicious sources using customer provided dictionaries
    • AI-driven augmentation of threat databases (add-on):
      • Intrusion detection: Machine learning driven dynamic updates to threat database based on behavioral analysis of the customer traffic
    • Standard Privafy policies and actions including block and notify:
      • Intrusion prevention for inbound access from malicious sources using standard Privafy policies. Supports ability to alert and block
    • Custom provided policies and actions (add-on):
      • Intrusion prevention for inbound access from malicious sources using customer defined policies. Supports ability to redirect
    • Privafy proprietary site-based DoS & DDoS detection & mitigation:
      • Mitigation of Site DoS and DDoS attacks based on standard Privafy rules
    • ML-based outlier detection (add-on):
      • Machine learning based identification and filtering of anomalous traffic based on past usage data and behavioral analysis
  • Granular access policy for Public/Private cloud and Saas
    • Device based:
      • Per device policy based conditional access
    • Location based:
      • Per location policy based conditional access
    • User based*:
      • Per user policy based conditional access
  • FIPS 140-2/3 (add-on)
  • JITC (add-on)
  • Common Criteria (CC) (add-on)
  • Rapid implementation using zero touch provisioning
    • Auto discovery:
      • Zero-touch Provisioning (ZTP) for initial set up for rapid service instantiation
    • Automated install from Privafy cloud:
      • Cloud backed automated config and policy management
    • Intelligent profile assignment, validation and activation:
      • Ability to assign profile based on higher level policy, auditing and activation
  • Companion App:
    • Easy to use, bluetooth based mobile app for assisted device setup
  • Categorization of alerting and alarms by severity and actionable:
    • Alarms and alerts to notify user of actionable and reportable activities
  • User selected multi-level event logging:
    • Detailed event logs for troubleshooting and compliance
  • Audit trails for system and user activity
  • Multiple administrator profiles and permissions for policy controls*:
    • RBAC for Privafy Central to allow roles like business owner, technical admin, billing admin
  • Real-time visibility of the usage, performance and health
    • Visibility:
      • Real-time dashboard view of the systems with network stats, health and insights on the network behavior at multiple granularity levels
    • Control:
      • Real-time controls on the dashboard to update and edit security and traffic rules of the network from the intuitive UI
    • Reporting:
      • REST API based reporting of above
    • Event logging:
      • REST API to expose events for use with existing tools
    • Alerting:
      • REST API to expose alerts for use with existing tools
  • Integration with user directories*:
    • Microsoft active directory
    • Google Suite directory
  • Multi-Cloud container architecture:
    • Container based cloud agnostic architecture that allows hosting in multiple public clouds for high performance and fault tolerance
  • Custom Private-Public Cloud Redundancy (add-on):
    • Multiple cloud hosted model ensures redundancy across multiple public clouds
  • Geographical redundancy – Local, Regional, Global:
    • Geographical redundancy at local, regional and global levels due to multi-cloud architecture
  • Active-active per-customer container-based cluster (add-on):
    • Active-active customer allocated Privafy service cluster
  • Database redundancy:
    • Service database redundancy for no loss of data and customer configurations
  • Customer Information Protection:
    • Privafy standards ensure customer information is not visible to anyone including Privafy services team
  • Amazon Web Service (AWS):
    • Secure connectivity between a Company’s physical locations and AWS public cloud
  • Microsoft Azure:
    • Secure connectivity between a Company’s physical locations and Azure public cloud
  • Google Cloud Platform (GCP):
    • Secure connectivity between a Company’s physical locations and GCP public cloud
  • Secure Access to Private Cloud (add-on):
    • Secure connectivity between a Company’s physical locations and their private cloud
  • Privafy Intrusion Detection System
    • Standard based on Privafy selected threat databases:
      • Intrusion detection for inbound access from malicious sources using standard Privafy dictionaries
    • Customer selected threat databases (add-on):
      • Intrusion detection for inbound access from malicious sources using customer provided dictionaries
    • AI-driven augmentation of threat databases (add-on):
      • Intrusion detection: Machine learning driven dynamic updates to threat database based on behavioral analysis of the customer traffic
  • Privafy Intrusion Prevention System
    • Standard Privafy policies and actions including block and notify:
      • Intrusion prevention for inbound access from malicious sources using standard Privafy policies. Supports ability to alert and block
    • Custom provided policies and actions (add-on):
      • Intrusion prevention for inbound access from malicious sources using customer defined policies. Supports ability to redirect
  • Denial of Service Prevention
    • Privafy proprietary site-based DoS & DDoS detection & mitigation:
      • Mitigation of Site DoS and DDoS attacks based on standard Privafy rules
    • Pre-emptive network-wide DoS & DDoS prevention rules*:
      • Dynamically preventing DoS and DDoS by implementing policies pre-empted by knowledge of attacks from other networks under Privafy management
  • Generic Inbound service management:
    • Ability to allow inbound access to the network only for authorized IP address
  • Header Inspection
    • Standard dictionaries and self-identified site ratings:
      • Headers based Inspection of content to detect and prevent loss of sensitive data using standard Privafy rules
    • Customer supplied policies (add-on):
      • Headers based Inspection of content to detect and prevent loss of sensitive data using customer rules
    • AI augmented dictionaries and ratings (add-on):
      • Headers based Inspection of content to detect and prevent loss of sensitive data using rules that are dynamically updated by Machine learning based on behavioral analysis of the customer traffic
  • Payload Inspection
    • Payload inspection using Private Intermediate Root Certificate:
      • Payload inspection using Private Intermediate Root Certificate
    • Standard Privafy dictionaries-based policies:
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses standard Privafy rules for authorizing the data flow
    • Customer supplied policies (add-on):
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses customer provided rules for authorizing the data flow
    • AI augmented dictionaries and ratings (add-on):
      • Payload inspection using Private Intermediate Root Certificate to detect and prevent loss of sensitive data. Uses Machine learning driven dynamic updates to rules created behavioral analysis of the customer traffic, for authorizing the data flow
  • Sandbox & Quarantine of unknown and suspicious content (add-on):
    • Ability to sandbox and quarantine suspicious content
  • Device/Endpoint detection & classification:
    • Detection of device or endpoint based on anomalous behavior and alerting with classification
  • HIPAA
  • PCI
  • Customer Traffic Prioritization
    • By Application*:
      • Prioritization of traffic based on criticality of the application to the business
    • Destination and Geography*:
      • Prioritization of traffic based on the destination or geography of traffic flow
    • Customer provided dictionaries for routing policies (add-on):
      • Prioritization of traffic based on customer defined policies
    • Policy-based bandwidth allocation*:
      • Bandwidth allocation for traffic based on predefined policies
  • Customer supplied per user traffic steering policy (Source/Cloud) (add-on):
    • Traffic policies at user level
  • Dashboard(s) for traffic data visualization:
    • Dashboard for visibility at network, user, device and application level
  • Intra-LAN traffic & broadcast detection & classification:
    • Intra-LAN traffic & broadcast detection and classification based on anomalous behavior, alerting to safeguard other users in the network
* Feature is coming soon and is not included in current website pricing.
Please contact Sales or your channel partner for pricing for add-on features. All Privafy services are governed by the Privafy Terms of Service and Privacy Policy. Privafy may at any time update the services or discontinue any feature or functionality

The way your data travels is changing, why hasn't your security?

Contact Sales