Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Roysons Taps Confluera to Secure Company’s Business-Critical Infrastructure

May 2021 by Marc Jacob

Confluera announced that Roysons, provider of unsurpassed printing and laminating services worldwide, has deployed the Confluera platform to secure its business-critical IT infrastructure, systems and data. Roysons deployed Confluera to help detect and prevent attackers from navigating through its network.

"Prior to implementing the Confluera platform, one of the biggest challenges for our security and IT teams was trying to manually manage, track and respond to all suspicious activity alerts we received daily, many of which turned out to be false positives," said Vipul Bosmiya, Director of Supply Chain & IT at Roysons. "Confluera helps us automate this process by storyboarding alerts and highlighting important remediation efforts, along with providing detailed how-to remediation insights. Confluera essentially acts as a powerful watchdog over all of our critical business systems."

Confluera’s ML-powered technology helps Roysons identify and track events across all MITRE ATT&CK tactics, including reconnaissance, discovery, and east-west traffic in real-time. Using Continuous Attack Graph technology, Confluera stitches together individual events into real-time threat storyboards as they unfold, giving Roysons full visibility into any attack progressions, reducing detection and remediation times from days to hours.

"Security analysts spend the bulk of their investigation efforts correlating events across multiple systems and tools, a task that is very error-prone, laborious and time-consuming," said John Morgan, CEO at Confluera. "The resulting outcomes often have false alarms and are available too late to take any preventative actions. Confluera helps companies like Roysons connect the dots to surface actual threats progressing through their workloads and take preventative actions before it’s too late."




See previous articles

    

See next articles