FAQ


0. Does Veezo replace my firewall?
No, Veezo does not replace your firewall, it complements it.
The firewall mainly applies predefined rules to filter and control network traffic. It works on the basis of these static rules to authorise or block connections. However, Veezo is much more autonomous: it doesn't just apply fixed rules, but continuously analyses the behaviour of network traffic, detects anomalies and threats in real time, and reacts proactively without human intervention. Whereas firewalls are limited to a guardian role based on instructions, Veezo actively identifies potential threats, both internal and external, adapts to new attack techniques and automates incident response, offering dynamic, scalable protection.

1. What is Veezo and how is it different from other network security solutions?
Veezo is an advanced security solution that acts as a Virtual Security Officer. Unlike traditional solutions, Veezo offers real-time threat analysis and rapid response to incidents, while being easy to deploy and use without requiring a large number of human resources. It is based on the sharing of resources, technologies and data between users to offer better protection against emerging threats.

2. How does Veezo protect organisations against network-based cyber-attacks?
Veezo uses a combination of network packet acquisition, real-time detection and behavioural analysis to identify threats. It combines multiple detection technologies, predictive artificial intelligence and analysis algorithms to recognise and block categories of threats such as vulnerability exploits, DDoS attacks, phishing, botnets and malware.

3. Can Veezo be integrated into an existing SOC (Security Operations Center) infrastructure?
Veezo does not replace an SOC, but complements it by providing continuous monitoring and automated response to threats. It can work in parallel with SOC teams, providing them with enriched information on detected incidents and improving the speed of response thanks to automated analyses.

4. What types of attack can Veezo detect and block?
Veezo can detect and block a wide range of threats, including :

  • DDoS (Denial of Service) attacks
  • Exploits of known vulnerabilities
  • Phishing and user-targeted attacks
  • Botnets and Command-and-Control (C&C)
  • Ransomware threats such as BlackCat
  • Unauthorised cryptocurrency mining activities (cryptojacking)
  • Suspicious espionage activities

5. Can Veezo protect against attacks targeting ageing systems or heterogeneous environments?
Yes, Veezo is specifically designed to protect complex environments, including those with legacy or disparate systems. Its ability to analyse network flows in real time means it can identify vulnerabilities in older systems that are not always compatible with the latest security updates.

6. How does Veezo help hospitals secure their digital environments?
Hospitals face unique challenges such as continuous availability of services, access to sensitive data and increasing cyber-attacks. Veezo offers proactive monitoring, in-depth analysis of network flows and rapid response to incidents, ensuring that patient data is protected, even in complex and heterogeneous environments. It also ensures that ageing systems are monitored and that threats targeting digital patient records (DPI) are blocked.

7. How does Veezo manage security incidents?
Veezo doesn't just detect threats: it automates incident response. Once a threat has been detected, Veezo immediately takes corrective measures, such as neutralising communications from infected machines, blocking malicious flows and attempts or blocking suspicious files or commands. These actions reduce response time and minimise the risk of human error.

8. What is the added value of Veezo for companies that do not have specialised cybersecurity staff?
Veezo enables businesses to benefit from a high level of protection without the need for specialist cyber security staff. Thanks to automation and detailed reporting, Veezo can manage security autonomously, which is particularly valuable for small and medium-sized businesses that lack in-house resources

9. How does Veezo keep its rules up to date and detect new threats?
Veezo is powered by continuous updates based on the latest threat intelligence. Its attack detection and classification engines are regularly updated to incorporate new signatures and attack tactics, ensuring that your infrastructure is protected against the latest threats. Veezo draws on the experience of all its customers and Honeypots to dynamically reinforce protection for active threats.

10. Does Veezo offer visibility of security incidents and vulnerabilities?
Yes, Veezo provides a complete and transparent view of detected security incidents, potential vulnerabilities and actions taken to mitigate these threats. Users can access detailed dashboards, real-time alerts and analysis reports to better understand the state of their security and follow up recommendations.


 



ozOos - Drève Richelle 161 H/15|1410 Waterloo | Belgium | Tel : +32 2 880 79 47 | sales@veezo.org