Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Endpoint Security

Avira Helps ISPs, Manufacturers Build Security Into Routers

Avira, a firm known mostly for its antivirus products, announced on Monday the launch of a new IoT security solution designed to help Internet service providers (ISPs) and router manufacturers protect their customers’ home networks.

Avira, a firm known mostly for its antivirus products, announced on Monday the launch of a new IoT security solution designed to help Internet service providers (ISPs) and router manufacturers protect their customers’ home networks.

Avira SafeThings is a router application and behavioral threat intelligence platform that offers benefits for both service providers and end users. By installing the product on the routers they provide to customers, ISPs can prevent malicious activity, such as distributed denial-of-service (DDoS) attacks coming from their networks. As for router manufacturers, SafeThings can help them deliver value-added IoT security services.

End users whose routers have Avira SafeThings installed gain complete visibility of the devices on their network, and obtain information on potential threats via a simple user interface. The vendor claims the product has zero impact on browsing and streaming performance.

According to Avira, SafeThings uses artificial intelligence and machine learning to create a profile for each device and establish its normal behavior, and develop protection policies. The security firm says the product only analyzes metadata on gateway traffic, which eliminates the need for invasive deep packet inspection (DPI).

SafeThings uses a software agent named Sentinel to fingerprint IoT devices connected to the router, and enforce protection and communication rules generated based on data from the Avira Protection Cloud.

The product also includes an API named Data Forefront that allows service providers and OEMs to control SafeThings functionality, such as specifying the type of action that is taken if a hacked device is identified.

“We’ve designed SafeThings to effectively solve the IoT vulnerabilities without being too invasive, expensive, or complicated for the end user – and we’ve done this in a way that provides additional benefits for the internet service providers and router manufacturers,” said Travis Witteveen, CEO of Avira.

Advertisement. Scroll to continue reading.

“We see SafeThings as a ‘B2B2C’ product, providing consumers with the security and privacy protection they need while delivering it to them via the internet service providers and router manufacturers. As an embedded software solution, SafeThings is imminently flexible according to each client’s technical and marketing needs,” Witteveen added.

Related: Enterprise IoT Security Firm Armis Emerges From Stealth

Related: The False Binary of IoT and Traditional Cyber Security

Related: New Legislation Could Force Security Into IoT

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet