{"id":206,"date":"2016-04-12T08:47:52","date_gmt":"2016-04-12T08:47:52","guid":{"rendered":"http:\/\/www.cloudcoffer.com\/?page_id=206"},"modified":"2024-09-26T09:34:32","modified_gmt":"2024-09-26T09:34:32","slug":"customized","status":"publish","type":"page","link":"https:\/\/www.cloudcoffer.com\/?page_id=206","title":{"rendered":"TIFF"},"content":{"rendered":"<p>The Intelligent Forbidden Function (TIFF) maximizes both effectiveness and efficiency. Our patent-pending solutions differ from current solutions in many ways.<\/p>\n<ul>\n<li><strong>We have applied machine learning mechanisms to make rules compact and efficient.<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">The rules come from many sources as follow.<\/p>\n<ol>\n<li>\u00a0\u00a0 Zero-day vulnerability research.<\/li>\n<li>\u00a0\u00a0 Honeypots like\u00a0WASC Distributed Web Honeypot Project.<\/li>\n<li>\u00a0\u00a0 Open data like National Vulnerability Database, Exploit-DB, and packetstormsecurity, etc.<\/li>\n<li>\u00a0\u00a0 Machine learning deduction.<\/li>\n<\/ol>\n<ul>\n<li><strong>There is no reason to apply defense rules for invulnerable systems. TIFF blocks potential risks based on users&#8217; applications, operating systems, and vulnerability. Users may apply rules according to the installed systems or applications. <\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">For example, if a user intends to protect her website built by WordPress, she may simply select WordPress in the menu of TIFF, and TIFF will block malicious requests that affect WordPress. TIFF may also analyze the protected systems and offer rule suggestions.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-250 aligncenter\" src=\"http:\/\/www.cloudcoffer.com\/wp-content\/uploads\/2016\/04\/tiff-classification.png\" alt=\"tiff-classification\" width=\"666\" height=\"346\" srcset=\"https:\/\/www.cloudcoffer.com\/wp-content\/uploads\/2016\/04\/tiff-classification.png 1504w, https:\/\/www.cloudcoffer.com\/wp-content\/uploads\/2016\/04\/tiff-classification-300x156.png 300w, https:\/\/www.cloudcoffer.com\/wp-content\/uploads\/2016\/04\/tiff-classification-768x399.png 768w, https:\/\/www.cloudcoffer.com\/wp-content\/uploads\/2016\/04\/tiff-classification-1024x532.png 1024w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>We provide customized rules for customers, based on the weakness of customers&#8217; systems. CloudCoffer is composed of information security experts, and we have rich experiences identifying vulnerability of systems for banks, governments, enterprises, hospitals, etc. You may submit a request form from <a href=\"https:\/\/www.cloudcoffer.com\/?page_id=246\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intelligent Forbidden Function (TIFF) maximizes both effectiveness and efficiency. Our patent-pending solutions differ from current solutions in many ways. We have applied machine learning mechanisms to make rules compact and efficient. The rules come from many sources as follow. \u00a0\u00a0 Zero-day vulnerability research. \u00a0\u00a0 Honeypots like\u00a0WASC Distributed Web Honeypot Project. \u00a0\u00a0 Open data like <a href=\"https:\/\/www.cloudcoffer.com\/?page_id=206\" rel=\"nofollow\"><span class=\"sr-only\">Read more about TIFF<\/span>[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-206","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/pages\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=206"}],"version-history":[{"count":23,"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=\/wp\/v2\/pages\/206\/revisions\/639"}],"wp:attachment":[{"href":"https:\/\/www.cloudcoffer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}