403
Sorry!!
Error! We're sorry, but the page you were looking for doesn't exist.
Traffic Origin: Preemptive Visibility For SOC And Compliance Teams
(MENAFN- EIN Presswire) EINPresswire/ -- Silent Push, a preemptive cybersecurity company, announced new platform capabilities centered on Traffic Origin, a solution designed to address identity obfuscation in modern enterprise environments.
As organizations expand remote work, cloud access, and third-party connectivity, security and risk teams rely on IP reputation and GeoIP data to support KYC, AML, KYE, and fraud controls. These tools evaluate only the visible entry point of a connection. When adversaries use residential proxies, VPNs, or laptop farms, access can appear local even when it is remotely controlled from high-risk or sanctioned regions. This creates a blind spot where hostile activity blends into trusted access.
Traffic Origin addresses this gap by identifying the upstream country of origin behind a connection, even when the observed IP and geolocation appear clean. Rather than relying on last-hop indicators, it shifts attribution to where traffic is actually routed and controlled, providing origin certainty where traditional tools cannot.
By exposing upstream origin mismatch, organizations can identify high-risk sessions earlier, detect identity deception missed by existing controls, and intervene before activity escalates into fraud, regulatory exposure, or financial loss.
“Modern adversaries no longer rely on obviously malicious infrastructure,” said Ken Bagnall, Co-Founder and CEO of Silent Push.“They deliberately operate through clean networks to blend in. Traffic Origin gives security teams the ability to see past that deception and make decisions based on where access is actually being controlled.”
Additional Customer Capability: Threat Check Module:
This release also introduces Threat Check as a native module within the Silent Push console. Threat Check validates suspicious IPs and domains against continuously mapped attacker infrastructure, including Indicators of Future AttackTM (IOFATM). Customers can ingest their own indicators, run Threat Check across multiple data sources, and review results through dashboards and analytics.
This enables earlier identification of attacker infrastructure, reduces alert noise, accelerates investigations, and provides measurable lead-time metrics that demonstrate return on investment. Traffic Origin serves as an additional data source for Threat Check, providing upstream origin certainty that enhances detection of identity obfuscation and malicious activity.
About Silent Push
Silent Push is a preemptive cybersecurity defense company. It is the first and only solution to provide a complete view of emerging threat infrastructure in real time, exposing malicious intent through its Indicators of Future AttackTM (IOFATM) data, enabling security teams to proactively block hidden threats and avoid loss.
The Silent Push standalone platform is also available via API, integrating with a wide range of security tools, including SIEM & XDR, SOAR, TIP, and OSINT, to provide automated enrichment and actionable intelligence.
Customers include some of the world's largest enterprises within the Fortune 500 and government agencies. Free community edition is available. For more information, visit or follow on LinkedIn and X.
As organizations expand remote work, cloud access, and third-party connectivity, security and risk teams rely on IP reputation and GeoIP data to support KYC, AML, KYE, and fraud controls. These tools evaluate only the visible entry point of a connection. When adversaries use residential proxies, VPNs, or laptop farms, access can appear local even when it is remotely controlled from high-risk or sanctioned regions. This creates a blind spot where hostile activity blends into trusted access.
Traffic Origin addresses this gap by identifying the upstream country of origin behind a connection, even when the observed IP and geolocation appear clean. Rather than relying on last-hop indicators, it shifts attribution to where traffic is actually routed and controlled, providing origin certainty where traditional tools cannot.
By exposing upstream origin mismatch, organizations can identify high-risk sessions earlier, detect identity deception missed by existing controls, and intervene before activity escalates into fraud, regulatory exposure, or financial loss.
“Modern adversaries no longer rely on obviously malicious infrastructure,” said Ken Bagnall, Co-Founder and CEO of Silent Push.“They deliberately operate through clean networks to blend in. Traffic Origin gives security teams the ability to see past that deception and make decisions based on where access is actually being controlled.”
Additional Customer Capability: Threat Check Module:
This release also introduces Threat Check as a native module within the Silent Push console. Threat Check validates suspicious IPs and domains against continuously mapped attacker infrastructure, including Indicators of Future AttackTM (IOFATM). Customers can ingest their own indicators, run Threat Check across multiple data sources, and review results through dashboards and analytics.
This enables earlier identification of attacker infrastructure, reduces alert noise, accelerates investigations, and provides measurable lead-time metrics that demonstrate return on investment. Traffic Origin serves as an additional data source for Threat Check, providing upstream origin certainty that enhances detection of identity obfuscation and malicious activity.
About Silent Push
Silent Push is a preemptive cybersecurity defense company. It is the first and only solution to provide a complete view of emerging threat infrastructure in real time, exposing malicious intent through its Indicators of Future AttackTM (IOFATM) data, enabling security teams to proactively block hidden threats and avoid loss.
The Silent Push standalone platform is also available via API, integrating with a wide range of security tools, including SIEM & XDR, SOAR, TIP, and OSINT, to provide automated enrichment and actionable intelligence.
Customers include some of the world's largest enterprises within the Fortune 500 and government agencies. Free community edition is available. For more information, visit or follow on LinkedIn and X.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment