Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

ExtraHop Introduces Threat ID to Keep Enterprises Ahead of Attackers with Real-Time Threat Detection

July 2017 by Marc Jacob

ExtraHop announced the release of its new Threat ID bundle, an extensible plug-in to the ExtraHop platform. ExtraHop Threat ID analyses east-west traffic within the datacenter, looking at common threat vectors including certificates, ciphers, DNS, and scans. The bundle then maps them against known configurations to help improve the security posture of IT organisations by proactively identifying and managing potential threats within the environment.

Technology and organisational gaps between IT and security teams often mean that neither team has the visibility or resources they need to quickly identify and remediate threats before they turn into a major breach. ExtraHop bridges this gap with network traffic analytics and the new Threat ID bundle delivering real-time visibility into suspicious port scans, data exfiltration activity, or indicators of an active attack that make it past perimeter defenses. Examples of new capabilities include:

● Instantly Detect Suspicious DNS Behavior and Scans: Threat ID surfaces suspicious DNS and port scanning behavior patterns, allowing users to rapidly identify potential threats quickly and initiate a targeted investigation.

● Proactively Manage Certificates and Ciphers: Threat ID delivers a complete map of encryption certificate strength and usage for accurate risk profiling. The bundle automatically identifies weak ciphers and determines how they are being used to better assess risk. The bundle also tracks expiring, expired, and wildcard certificates that could put data at risk or impact service delivery, and audits usage of non-compliant and outdated transport layer security protocols such as SSLv3 or TLSv1.0.

Through the ExtraHop integration with ServiceNow, these types of anomalies automatically trigger alerts, kicking off a workflow in ServiceNow so security and IT operations teams can easily quarantine an infected client.

The Threat ID bundle joins a constellation of extensible plug-ins from ExtraHop aimed at helping global enterprises improve their security posture with real-time insight and rapid remediation. The ExtraHop Ransomware bundle analyses traffic from the SMB/CIFS network protocol to detect known ransomware file extensions and behavior patterns associated with the malware. The ExtraHop Active Directory bundle tracks user accounts, computer accounts, DNS, LDAP, global catalog, and group policy loads to help ensure security and compliance. Together, the Threat ID, Ransomware, and Active Directory bundles address critical blind spots in today’s IT environments and enable organisations to quickly enhance their security posture.




See previous articles

    

See next articles