We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Stop AI-Driven Botnet Attacks with L7 Defense' Unsupervised Learning

Ditsa Keren Technology Researcher

L7 Defense is a pioneer in applying a novel “unsupervised learning” technology named Ammune™, which excel in its exceptional accuracy while differentiating “good” from “bad” internet traffic, in real time. Ammune, which originates from the Immune system model, protects from the most advanced botnet attacks currently empowered by AI.  In this interview, Co-founder Yisrael Gross discusses the technology behind Ammune and stresses the importance of cyber security automation.

My name is Yisrael Gross and I'm a co-founder at L7 Defense. With background of marketing & Business Development for startups while also managing some major High Tech communities in Israel. It was in one of those events that I met my partner Dr. Doron Chema, co-founder of L7 Defense that is the company CEO and CTO.

The cyber scene in Israel is a closed loop where everyone is close friends mostly from the IDF units. Let's say an entrepreneur comes along and he wants to dive right into it. But it’s a closed group, so what does he do? You have to be creative. In my case, I launched "Israel Cyber Group", cyber security community which eventually grew into the largest forum in the Israeli cyber space. Others may use other approaches to that challenge. So, I think that it is just a matter of using your relevant experience to reach that point.

What is the L7 Defense's technology all about?

It is a novel usage of a given bioinformatics algorithm which grew into a new type of unsupervised learning model. Ammune™ protects from the most dangerous AI-driven IoT botnet attacks as well as from previous generations of botnet technologies, as a standalone system, an embedded system or a cloud solution.   The way it works is it identifies the most complex malicious “patterns” from the traffic, that aren’t even visible to other tools.  The resulting patterns and output “signatures” are extremely accurate and algorithmically controlled by the target error rate (“False Positive”). Business wise, it serves many important values to the customers, including “Plug & Play” deployment followed by almost a zero need for maintenance support. It is very accurate by its results, causing usually no damages to customers and keeping their privacy safe, as fit to the GDPR regulation. Our current offering include DDoS mitigation solution as well as a robust Web Application Firewall solution. This product takes the defense layer into a much broader scope then used today, covering major “business threats” on users, accounts and transactions made by advanced botnet types mentioned above. A major advantage is that the product is deployed at the customer “yard”, with no need to share encryption keys, serving the GDPR compliance.

l7 defense Ammune dashboard

In such a competitive market, what makes your product unique?

The response to that question is clear-cut. To the best of our knowledge, we are the sole vendor that has repeatedly demonstrated its capability to effectively safeguard against AI-enabled IoT-botnet attacks. Regrettably, such attacks, including the prevalent occurrence of "credential stuffing" problems, where breached username/password combinations are automatically injected to illicitly gain access to user accounts, have become increasingly common. Hence, the straightforward answer is that we provide protection against existing threats that others are unable to deliver. While we certainly uphold the mentioned values, it is ultimately the defense against threats that holds the utmost importance from a customer standpoint.

Who is your typical client?

Enterprises and operators who wish to protect themselves from cyber attacks.  Currently we see a lot of traction from the finance sector as well as from the government. The next wave is expected from internet companies, as we intend to launch our WAF product soon to be used directly at major cloud platform such as Amazon.

What can you tell us about L7 Defense's future plans?

The future is in automation and accuracy. These are the parameters which cyber solutions will be increasingly judged by, especially at Edge computing emerging field, alongside with traditional IT playgrounds, such as the cloud. We intend to be there for our customers.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Ditsa Keren is a cybersecurity expert with a keen interest in technology and digital privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.