Corvil Launches User-Centric Network Traffic Analysis For Accelerated Insider Threat Detection and Response
Solution automatically provides Security Analysts with a unified view of user identity, host and network activity in one system
DUBLIN, Ireland, Feb. 27, 2018 (GLOBE NEWSWIRE) -- Corvil today announced the new release of its Security Analytics solution, which helps organizations identify malicious behavior from compromised user accounts that increase the risk of data theft and reputational damage.
With the coming introduction of regulations such as General Data Protection Regulation (GDPR), it is imperative that users and their data are protected by organizations. GDPR mandates notification of a data breach within seventy-two hours. Therefore, the ability to quickly detect abnormal user behavior, network access patterns and data exfiltration is essential.
Addressing these challenges, Corvil now provides unified, granular visibility and insight to activity across users, hosts, applications, and services. By presenting a prioritized list of the most suspicious users in the environment as well as activity across associated devices of all types, security teams can rapidly see, understand and act on evasive threats and protect high-value assets.
"In today's world, responding to insider threats depends on gaining comprehensive understanding of user activities across traditional IT domains - endpoints, networks, perimeters. Corvil's ability to provide comprehensive user activity insights into the security ecosystem represents a major step forward," said David Monahan, Managing Research Director, Security and Risk Management, Enterprise Management Associates, Inc.
The Corvil solution captures and analyzes L2-L7 network activity in real-time, contextually enriches with user identity and other data and automatically detects patterns of attack. Through streamlined workflows and intelligence sharing with the broader Security and Network Operations ecosystem (including SIEMs, Endpoint Detection and Response, Threat Intelligence, Next Generation Firewalls, and many big data systems), Security Teams can more effectively and efficiently combat threats in today's complex environments.
With a single click, an analyst can quickly triage, forensically investigate and respond to incidents such as insider threats, evasive attack movements and ransomware attacks. By providing linkage to the granular underlying communications, Security Teams can more quickly and with confidence, detect, identify the source, and determine the impact of breaches - live and retrospectively.
This solution is complemented by the machine learning-driven virtual security expert, Cara, released last year and deployed at some of the largest financial institutions in the world, to autonomously identify vulnerabilities and attacks in electronic financial transaction environments. While Cara's daily cybersecurity intelligence report includes a cyber risk assessment score consumable by c-level executives, Corvil Security Analytics provides the additional granular, forensic record of user and host activity to help support compliance with emerging cybersecurity and data privacy regulations such as GDPR.
"Organizations today face unprecedented risk from cyber-attack and data loss," says Graham Ahearne, Director, Security Product Management. "As the automation and sophistication of attacks increases, all too often compromised user accounts, attacker footholds within the environment, and careless or malicious insiders are the elusive source. Our new user-centric analytics provide security analysts with a unified view of all user activity on the host and on the network combined with automated risk-scoring, and actionable intelligence to accelerate detection, triage and response."
Security incidents expose organizations to reputational damage, legal and compliance exposure, and financial losses. With more than 80 percent of breaches stemming from inadvertent or malicious insiders, and with increasingly complex dynamic technology environments, organizations face new and growing threats every day. The faster an organization can identify and contain a data breach, the lower the costs. However with a growing and diverse range of connected devices coupled with increasingly sophisticated and evasive attacks, it can take as long as five months to detect a breach.
Compounding matters, today's Security teams face shallow visibility and manual workflows often across fragmented systems while attempting to respond to a barrage of alerts. While many technologies focus solely on a host-centric view of activity, attackers increasingly gain access through compromised user accounts, escalated privileges and covert communications that are undetectable without closer, more comprehensive analysis.
To learn more about Monitoring User Activity Across Network For Threat Detection and Response see details of our 2018 Corvil and Forrester Webinar.
Corvil's new Security Analytics release is generally available now. For more information, or to contact a Corvil representative, please visit corvil.com.
Corvil is the industry leader for deriving Security, Operational, and Business intelligence from network data. As companies adopt faster and smarter machine technology, it becomes critical to tap into richer and more granular machine data sources to safeguard the transparency, performance and security of critical infrastructure and business applications. The Corvil streaming analytics platform captures, decodes, and learns from network data on the fly, transforming it into machine-time intelligence for network, IT, security and business teams to operate efficiently and securely in this new machine world. Corvil uses an open architecture to integrate the power of its network data analytics with the overall IT ecosystem providing increased automation and greater operational and business value outcomes for its users. The Corvil solution is trusted by leading financial institutions to safeguard their businesses across the globe involving 354 trillion messages with a daily transaction value in excess of $1 trillion.
Notes to the editor
 81% of hacking-related breaches leveraged either stolen and/or weak passwords - 2017 Verizon DBIR. This means that 81% of attacks will come from hacker controlled machines inside the perimeter.
 Mean time to detect -
Press Office at Corvil
+353 1 859 1040
The issuer of this announcement warrants that they are solely responsible for the content, accuracy and originality of the information contained therein.
Source: Corvil via Globenewswire
Om Nasdaq GlobeNewswire
One Liberty Plaza - 165 Broadway
NY 10006 New York
+1 212 401 8700http://www.nasdaqomx.com
NASDAQ (NASDAQ: NDAQ) is a leading provider of trading, exchange technology, information and public company services across six continents.
Følg saker fra Nasdaq GlobeNewswire
Registrer deg med din epostadresse under for å få de nyeste sakene fra Nasdaq GlobeNewswire på epost fortløpende. Du kan melde deg av når som helst.
Siste saker fra Nasdaq GlobeNewswire
Agrisolutions Acquires Trinity23.3.2018 12:00 | Pressemelding
HAMILTON, Ontario, March 23, 2018 (GLOBE NEWSWIRE) -- Venanpri Group's Agrisolutions division, which services the global agricultural marketplace with its Ingersoll and Bellota brands, announced today the acquisition of Trinity Logistics Corporation ("Trinity"). Based in the U.S., Trinity provides supply-chain solutions relating to fasteners and other components to leading global OEMs that produce mission critical machinery for the agricultural and construction end markets. The terms of the transaction were not disclosed. Headquartered in Davenport, Iowa, Trinity has established ten strategically located service facilities throughout the United States. Trinity specializes in the supply of standard and custom components through vendor managed inventory programs and other arrangements tailored to customer needs. Trinity utilizes its industry leading technology to improve the flow of products, services and information across the supply chain resulting in excellence in the operations of it
Comodo CA Sees 35 Percent Year-Over-Year Increase in EV Certificates22.3.2018 15:47 | Pressemelding
EV SSL will be a topic of discussion at the Comodo CA booth during RSA 2018 CLIFTON, N.J., March 22, 2018 (GLOBE NEWSWIRE) -- Comodo CA, a worldwide leader in digital identity solutions, will address evolving cyberthreats and the increasing importance Extended Validation (EV) TLS/SSL certificates play in securing websites and inspiring consumer trust at the RSA Conference 2018, San Francisco, April 16 - 20. According to the Feb 2018 Netcraft report, Comodo CA has seen a 35 percent year-over-year increase of EV certificate units* making it one of the fastest growing providers of high assurance certificates. The volume of EV certificates globally also saw a record year in 2017 as more and more businesses adopt EV as standard practice for their websites. The demand for stronger, more secure EV certificates comes in the wake of increased phishing websites using Domain Validated (DV) certificates. Phishing websites imitate legitimate websites to steal customers' funds and identities. Phishi
CBT Pharmaceuticals to Grow Immuno-Oncology Pipeline by License Agreement of CrownBio CTLA-4 Antibody22.3.2018 14:43 | Pressemelding
SAN DIEGO, March 22, 2018 (GLOBE NEWSWIRE) -- Crown Bioscience, a wholly-owned subsidiary of Crown Bioscience International (TWSE:6554) and a global drug discovery and development services company providing translational platforms to advance oncology, inflammation, cardiovascular and metabolic disease research, announced today a strategic licensing agreement with CBT Pharmaceuticals (CBT), a U.S. and China-based innovative biopharmaceutical company committed to becoming a leader in the discovery and development of oncology combination therapies. The agreement gives CBT exclusive world-wide development and commercialization rights to a novel, recombinant, human monoclonal antibody which targets a differentiated epitope on the cytotoxic T-lymphocyte antigen-4 (CTLA-4) molecule. Binding of this antibody to CTLA-4 blocks the interaction of CTLA-4 with its ligands CD80/CD86 thus allowing the cytotoxic T cells to function actively. Under the terms of this global licensing agreement, CBT gain
Cloudflare Announces Mobile SDK to Monitor Network Performance for Applications22.3.2018 14:00 | Pressemelding
New free solution delivers network analytics to any mobile app developer SAN FRANCISCO, March 22, 2018 (GLOBE NEWSWIRE) -- Cloudflare, the leading Internet performance and security company, today announced the Cloudflare Mobile SDK, a free solution that enables any mobile app developer to understand network performance and metrics. Consumers are frustrated by mobile apps that are slow, crash, or deliver errors that degrade the user experience. For mobile app developers, a bad user experience means poor reviews, lower engagement, and reduced conversion on business metrics. Delivering consistent app performance requires focusing on every link in the chain: app code, network calls between the app and edge networks, and server infrastructure. There are a number of solutions that give developers analytics on their applications, but there has never been a way for app developers to understand how often their apps fail due to network errors. App developers easily integrate the Cloudflare Mobil
Compuware: Survey Shows Critical Mainframe Workloads Increasing While Mainframe Staff Losses Remain Unfilled22.3.2018 13:00 | Pressemelding
Many Organizations Not Measuring, Prioritizing Vital Key Performance Indicators 57 percent of enterprises with a mainframe currently run more than half of their business-critical applications on the platform-with that number expected to increase to 64 percent by next year. 72 percent of customer-facing applications are completely or very dependent on mainframe processing. Enterprises have only replaced 37 percent of the mainframe workforce lost over the past five years. Many organizations surveyed are not currently measuring velocity or efficiency key performance indicators, putting them at a disadvantage in the digital age. DETROIT, March 22, 2018 (GLOBE NEWSWIRE) -- The mainframe is becoming more important to large enterprises, with the percentage of organizations running at least half their business-critical applications on that platform expected to increase next year. However, the loss of skilled mainframe staff, and the failure to subsequently fill these positions, pose significan
SEMAFO: Construction of Boungou Mine 87% Complete22.3.2018 12:00 | Pressemelding
Dry Plant Commissioning Underway MONTREAL, March 22, 2018 (GLOBE NEWSWIRE) -- SEMAFO Inc. (TSX:SMF) (OMX:SMF) is pleased to announce that construction of the Boungou Mine in Burkina Faso is 87% complete, with first gold scheduled to be poured early in the third quarter of 2018. In a first step towards this milestone, the Corporation began commissioning activities on dry plant equipment this week. All amounts are in US dollars unless otherwise stated. Over the coming weeks, as construction continues, the crushing and reclaim circuit equipment required for initial production will undergo testing. The power plant, which was over 90% complete at the end of February, has been partially operational since early March. As at February 28, 2018, the additional key achievements had been made: Development on budget with US$182 million of the US$231 million capital expenditure incurred Construction of the mine 87% complete Completion of some 94% of structural steel and mechanical installation Pipin
I vårt presserom finner du alle våre siste saker, kontaktpersoner, bilder, dokumenter og annen relevant informasjon om oss.Besøk vårt presserom