Fortune USA 201906

(Chris Devlin) #1

How real-time network


analysis and machine
learning can help
enterprises spot and
react to threats faster.

THE FIRST RULE OF


CYBERSECURIT Y:


TRUST NO ONE


WHO CAN YOU TRUST IN A DIGITAL WORLD


where cybercrime is one of the fastest-
growing forms of criminal activity? The
answer is no one, according to the cyber-
analytics security experts at ExtraHop,
who note that in increasingly virtualized
and complex corporate IT environments,
even authorized users’ tools and devices
can quickly become compromised. “To-
day’s digital infrastructure looks vastly
different from the technology organiza-
tions employed 10 years ago—and the
sheer surface area of systems that need
protecting has grown exponentially,”
says Jesse Rothstein, chief technology
officer at ExtraHop. Luckily, network
traffic analysis solutions backed by
self-improving machine-learning routines,
such as those ExtraHop offers, can help
businesses spot threats 95% faster—and
combat them 60% more rapidly.
“In a world where high-tech attackers


can fire 100,000 arrows, and only one
needs to land in order to compromise


security, it’s not a question of if breaches
will occur, but when,” Rothstein says.
Zero-trust frameworks can help contain
the scope of damage these attacks cause,
but the traditional strategy of safeguard-
ing organizations’ high-tech backbones
by defending perimeters and endpoints
isn’t enough to keep systems safe.
To maintain data integrity and mini-
mize the effect of breaches, Rothstein
says, it’s also crucial to monitor online
communications at every touchpoint and
to stay vigilant toward incoming attacks.
ExtraHop’s Reveal(x) network traffic
analysis solution is designed to easily
integrate with and piggyback upon pre-
existing organizational IT frameworks, al-
lowing insight even into encrypted com-
munications (while still maintaining data
privacy and security), which provides
greater visibility into everything that’s
happening on a network. And because
cybercriminals can’t hide from, tamper
with, or turn off network traffic analysis,
Reveal(x) also provides the tools needed
to quickly quarantine and stamp out
unwanted intrusions at the source.
Backed by intelligent machine learn-
ing routines to help users get smart
about what passes for normal behavior
on their networks—and rapidly spot
anomalies—Reveal(x) grows more ef-
fective over time, so the minute threats
arise, an enterprise is ready to freeze
them in their tracks. “We provide organi-
zations with all the capabilities that they
need to monitor every communication
between every user and system in hybrid,
cloud, and software-as-a-service (SaaS)
environments, and optimize threat detec-
tion,” says Rothstein. “Armed with these
tools, enterprises can deliver a more
rapid, up-to-date, and complete security
response.” ●

CONTENT FROM EXTRAHOP

Free download pdf