Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

ExtraHop Adds Application-Level Visibility to Cisco Tetration

June 2017 by Marc Jacob

Today at CiscoLive, ExtraHop announced it has completed integration efforts with Cisco Tetration AnalyticsTM, adding essential threat detection and security policy enforcement from the datacenter to the cloud to the edge.

Through this integration, ExtraHop and Cisco customers can now realise the benefits of network traffic analysis for security. By combining industry-leading behavioral analytics, machine learning, and application layer visibility, Cisco and ExtraHop now deliver the industry’s most targeted, accurate, and rapid security policy enforcement, helping customers thwart major threats. Cisco and ExtraHop will demo the new integration during CiscoLive, June 25-29, 2017 in Las Vegas. Visit ExtraHop Booth 329 or the Cisco Solutions showcase to learn more.

Cisco Tetration provides security policy enforcement for zero-trust implementations, detecting anomalous network behavior and automatically triggering enforcement policies. ExtraHop adds a new layer of valuable context through real-time application-level visibility, revealing the specific activity behind abnormal traffic patterns. This integration delivers both powerful insight, as well as the ability to detect incidents including:

● Brute Force Logins: With this new ExtraHop integration, Tetration users can now detect a spike in database traffic and determine whether the traffic spike is due to brute-force login attempts, along with the specific tables that are being queried. ExtraHop applies Tetration annotations to identify the clients and servers involved. Tetration then executes security policies to isolate at-risk clients and servers.

● Ransomware: Tetration customers can now detect Ransomware attacks in real-time with the ExtraHop platform’s deep analysis of CIFS traffic and then take action to stop it. When ExtraHop detects a Ransomware attack, Tetration annotations are applied to identify the compromised hosts, which are then instantly quarantined with the application of security policies.

● Certificate and Cipher Audits: ExtraHop audits the network to identify rogue and expired certificates and weak ciphers, and applies Tetration annotations to identify affected servers so that users can take remedial action.




See previous articles

    

See next articles