Malicious software doesn’t just drag down individual machines — it’s also a huge drain on networks. That’s why Simplicita has created Simplicita ZBX, an identification and quarantine system that works by targeting both suspicious sites and infected machines.
While the product is now available for Internet service providers, an enterprise version that works with private networks should be available by next summer.
Simplicita ZBX is actually made of up three components that together create a tight ID and quarantine system. (See screen shot below.) First, the Reputation Knowledge Server creates a list of IPs that are known to send malware. To gather this, the company relies heavily on the unsung work of the Shadowserver Foundation, which complies databases of harmful Internet activity.
The Reputation Knowledge Server passes information to the DSN Traffic Switch, which blocks access to malicious sites. Previous efforts at controlling the problem have relied on individual users downloading and installing anti-virus programs. But administrators can’t hope for full compliance, so it’s more effective to simply block access to known trouble spots.
When a computer is infected with malware or when it attempts to access a suspicious site, the third component, the Walled Garden Server, comes into play. If the user has a corrupted machine, this server can provide access to software downloads that can clean it, or provide a link to technical help.
If the user was trying to access a known malware provider, this page could explain why the connection can’t be made.
You can see an example of Simplicita ZBX’s warning page, which tells users how to fix their computers, in this screen shot.
The messages are customizable, and the entire page can be make to look like the host company’s own Web pages, so that users are more likely to see it as an official page.
Simplicita gauges that 3 to 8 percent of computers are infected with some type of malware, and that leads to slower performance and increased network traffic as the malware connects to other machines and attempts to spread itself. The Simplicita system takes the user out of the equation, and simply puts a halt to malicious network traffic. The process is invisible to the users and doesn’t slow down network traffic or result in longer page load times.
The Simplicita software is written as an appliance, and fits in with any existing network. There’s no need to redesign the network to accommodate it. The apps will run with any variant of UNIX.
Simplicita has so far developed Simplicita ZBX for Internet service providers, since they’re large companies and the potential returns are greater. But it recognized the needs of businesses and is currently working with partners to develop a solution that other types of companies could use. While Simplicita ZBX has only been commercially available for six weeks so far, the company already has four providers signed up for testing and two others interested in buying individual components.
As the corporate version isn’t ready yet, Simplicita recommends asking your service provider what type of anti-phishing and anti-botnet software they have in place. Look for an active solution. Relying on individuals to safeguard their machines is only part of the answer. Stopping malicious traffic before it starts, says Simplicita, is far more comprehensive.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.