Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LAS VEGAS, NV -- (Marketwired) -- 11/11/14 -- AWS re:Invent -- ExtraHop®, the global leader in real-time wire data analytics for IT intelligence and business operations, today announced an integration of the ExtraHop wire data analytics platform with the FireEye Threat Analytics Platform (TAP). Through this integration, which leverages the ExtraHop Open Data Stream technology to push wire data into the FireEye TAP, IT security teams are armed with near real-time attack visibility to more effectively detect and defend against advanced persistent threats.
In his report "Network Security Trends in the Era of Cloud and Mobile Computing," Enterprise Strategy Group's Jon Oltsik notes that "61% of enterprises now divide their network security equally between perimeter and internal networks." As this new emphasis on securing the internal network grows, IT and security teams are looking to next-generation network monitoring products to stay ahead of threats.
The integration of wire data from ExtraHop into the FireEye TAP delivers this next-generation visibility, arming IT security teams with an enriched security dataset, including the events and metrics needed to detect advanced persistent threats. ExtraHop wire data adds a new dimension of context to event streams being fed into TAP, which can then leverage rich insights from FireEye into threat actor profiles and behavior. This critical new data set cannot be sourced from machine or log data, but when combined and correlated together, ushers in a new era of near real-time threat analytics.
The integration sends the following crucial events and metrics to the FireEye TAP:
"Phishing attacks are one of the most pervasive ways that threat actors use to compromise endpoints," said Steve Pataky, vice president of worldwide channels and alliances at FireEye. "FireEye TAP significantly improves an organization's capabilities to detect advanced attacks, and when combined with wire data from ExtraHop, TAP gives incident responders and security teams near real-time, actionable intelligence in a central dashboard where they can quickly identify and respond to the most critical events."
"In less than a year, we've witnessed two of the most significant zero day events in history: Heartbleed and Shellshock. The rapid exploitation of these vulnerabilities, along with a number of high-profile data breaches, underscores the need for a more proactive, pervasive approach to IT security monitoring and forensics," said Erik Giesa, Senior Vice President of Worldwide Marketing and Business Development, ExtraHop. "This integration between ExtraHop and FireEye merges the critical next-gen network intelligence provided by wire data with the industry-leading threat analysis offered by the TAP solution, equipping IT security teams with the most complete visibility and threat detection on the market."
To learn more about how ExtraHop is working with FireEye, download the datasheet: ExtraHop and FireEye -- Detect Advanced Persistent Threats by Examining Activity on the Wire. To get started with ExtraHop, request your free-forever virtual appliance for real-time monitoring.
About ExtraHop
ExtraHop is the global leader in real-time wire data analytics. The ExtraHop Operational Intelligence platform analyzes all L2-L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility essential for network and application performance, availability, and security in today's complex and dynamic IT environments. The winner of numerous awards from Interop, TechTarget, and others, the ExtraHop platform scales up to 20Gbps in a single appliance, deploys without agents, and delivers tangible value in less than 15 minutes. Learn what we mean at www.extrahop.com or follow us on Twitter @ExtraHop.
ExtraHop Contact
Rachel Pepple
pr@extrahop.com
206-462-2240
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs