Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Securonix Announces Network Traffic Analysis Product Offering.

by The Gurus
August 1, 2019
in Guru's Picks
Securonix Announces Network Traffic Analysis Product Offering.
Share on FacebookShare on Twitter

Securonix, Inc., a leader in next-gen SIEM, today announced the launch of its network traffic analysis (NTA) product that will provide bundled Corelight network sensors and use case content. Securonix NTA will be an integral part of the Securonix SIEM product, enabling customers to deploy a single solution that correlates network traffic, security events, and entity context to detect and respond to the most advanced insider and cyber threats.

Customers today are struggling to detect the sophisticated slow and low attacks which require monitoring a blend of network traffic activity, user actions, and system behaviour patterns. Stand-alone network traffic analysis tools can monitor traffic and detect network traffic anomalies, however, such anomalies without the user and system context are less actionable and can add to the noise. Traditional SIEM solutions, have the same problem – unless they are ingesting network traffic metadata, they lack the context to differentiate real threats from bad hygiene user activities.

With Securonix NTA, the Securonix SIEM platform now provides customers a single platform that monitors and correlates network traffic events, security events, and user activities (with built in UEBA) to detect the most advanced threats. The solution uses the MITRE ATT&CK framework to help incident responders organise the indicators of compromise (IOCs) from NTA, SIEM, and UEBA and to help them break or interrupt an attacker’s kill chain, and to surface the highest risk threats to their environment.

“Cyber threats continue to become more advanced and complex every day. Looking at user activity, security logs, and network events in silos may result in advanced threats going undetected,” said Nitin Agale, SVP of strategy and marketing at Securonix. “By combining SIEM, UEBA, NTA and SOAR functionality in a single platform, Securonix is providing customers with fully integrated solution for effectively detecting, investigating and responding to advanced threats.”

Securonix NTA combines data from Corelight sensors which provide real-time insight by extracting more than 400 data elements from network traffic in real time across dozens of protocols and data types. Securonix ingests this data using built-in connectors and enriches it with relevant user, entity, and threat intelligence context. The integrated network analysis and threat model content triggers alerts and combines it with other indicators of compromise using the MITRE ATT&CK framework as a construct. Securonix then surfaces the actionable threats so analysts can quickly investigate and remediate in real-time.

“When collecting network data, it is important to focus on the right data at the right time to avoid being drowned in infinite volume of meaningless events,” said Brian Dye, chief product officer at Corelight. “Corelight sensors capture comprehensive and rich data on the various network protocols such as DNS which when combined with the powerful analytics and correlation capabilities of Securonix can help customers focus on real threats and take corrective actions before a breach occurs.”

About Securonix

Securonix is redefining SIEM using the power of big data and machine learning. Built on an open Hadoop platform, Securonix Next-Gen SIEM provides unlimited scalability and log management, behaviour analytics-based advanced threat detection, and automated incident response on a single platform. Globally, customers use Securonix to address their insider threat, cyber threat, cloud security, and application security monitoring requirements. Follow Securonix on Twitter, Facebook, or LinkedIn.

FacebookTweetLinkedIn
Share2TweetShare
Previous Post

91% Of The UK Would Like Better Privacy Laws For IoT Devices

Next Post

Record Number Of Data Breaches

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information