CIO Influence
CIO Influence News Networking Security

New Long-Term Behavioral Analytics in LiveAction ThreatEye NV Allows SOC Teams to Detect Hidden Threats on the Network Over Time

New Long-Term Behavioral Analytics in LiveAction’s ThreatEye NV Allows SOC Teams to Detect Hidden Threats on the Network Over Time
Company also signs strategic investment and technology development agreement with In-Q-Tel

LiveAction, a leader in unmatched visibility for network security and performance, announced new long-term behavioral analytics capabilities in ThreatEye NV, its network detection and response platform (NDR). The platform combines next-generation data collection, advanced behavior analysis and streaming machine learning.

Latest ITechnology News: TigerGraph ML Workbench Delivers Deep Learning and Graph Neural Network Frameworks for Rapid, Accurate ML and AI Modeling

As malicious actors increasingly hide indicators of compromise within encrypted traffic, SecOps teams need real-time visibility into that traffic and must also detect anomalies that are chained together in attacks over days, weeks, or months.

ThreatEye NV helps organizations and their SecOps teams improve threat detection and prevent adversaries from executing successful disruptive and damaging cyberattacks. It delivers real-time threat and anomaly detection, helps eliminate encryption blindness and compliance, simplifies deployment from core to cloud to edge using SaaS, gives SOC teams a multi-stage analysis pipeline that accelerates investigation and response, and seamlessly integrates with existing security tools like SIEM, SOAR and Threat Intelligence.

ThreatEye NV’s long-term behavior analysis uses encrypted traffic analysis (ETA) with Deep Packet Dynamics (DPD) eliminating any need for payload inspection. It collects all relevant behavior data (based on more than 150 different packet traits) and uses streaming machine learning (ML) to baseline network activity over time. This allows SecOps to identify anomalies that emerge above typical thresholds and track broader attacks that could be in process.

The more data an organization collects, the more analysis can be done, but many organizations struggle with heavy data lake requirements and scalability challenges. ThreatEye NV eliminates this problem by combining its unique DPD technology for ETA with a SaaS-based platform approach, making long-term behavior analytics scalable and affordable.

“Today, most network traffic is encrypted, and we know that more than 90% of malware hides in this traffic. When that’s combined with the fact that attacks are often broken into various stages and hidden throughout a network over time, you have a recipe for a successful vulnerability,” said Dr. Andrew Fast, Chief Data Scientist at LiveAction. “Long-term behavioral analysis builds on the power of ETA to give SecOps teams the ability to surface these behaviors and mitigate those attacks. Whether its reconnaissance, lateral movement, data exfiltration or some other behavior, ThreatEye NV detects these adversarial tactics.”

Latest ITechnology News: Nokia and Taiwan Mobile strengthen partnership with energy-efficient 5G coverage expansion deal

New Strategic Investment by In-Q-Tel

In addition to the new long-term behavioral analysis capabilities, LiveAction is announcing a new strategic investment and technology development agreement with In-Q-Tel, the not-for-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies.

“We believe our partnership with In-Q-Tel further validates our groundbreaking approach to protecting organizations and agencies,” said LiveAction CEO, Steve Stuut. “Encrypted Traffic Analysis focuses on packet dynamics and combines machine learning with traditional traffic analysis techniques. This combination allows us to do analysis and provide security for encrypted connections without decryption. That means we can maintain privacy and still have security. We can have both at the same time. And that is a message we look forward to sharing with In-Q-Tel’s government partners.”

“We were impressed with LiveAction’s differentiated approach to Encrypted Traffic Analysis, combining traditional traffic analysis with cryptanalysis techniques and applying streaming machine learning to uncover malicious activity on the network. Their use of behavioral based analysis on encrypted network traffic eliminates the need for traffic decryption while still providing the visibility needed to secure enterprise networks, allowing for an improved security posture,” offered Bentz Tozer, Vice President, Cyber Practice at In-Q-Tel.

Latest ITechnology News: Atos launches Nimbix Supercomputing Suite

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Unrivaled Threat Intelligence and Protection Comes to the APAC Region with Flashpoint-Cybermerc Partnership

Avid Unveils Sibelius Mobile App Placing Powerful Notation Tools at Music Creators’ Fingertips Everywhere They Go

CIO Influence News Desk

EMA Research Examines the Strategies Enterprises are Developing to Support the Networking Requirements of Remote and Hybrid Workers

GlobeNewswire

Leave a Comment