Virtualization Technology News and Information
Article
RSS
ExtraHop Introduces Threat ID to Keep Enterprises Ahead of Attackers with Real-Time Threat Detection

ExtraHop, the leader in real-time IT analytics, today announced the release of its new Threat ID bundle, an extensible plug-in to the ExtraHop platform. ExtraHop Threat ID analyzes east-west traffic within the datacenter, looking at common threat vectors including certificates, ciphers, DNS, and scans. The bundle then maps them against known configurations to help improve the security posture of IT organizations by proactively identifying and managing potential threats within the environment.

Technology and organizational gaps between IT and security teams often mean that neither team has the visibility or resources they need to quickly identify and remediate threats before they turn into a major breach. ExtraHop bridges this gap with network traffic analytics and the new Threat ID bundle delivering real-time visibility into suspicious port scans, data exfiltration activity, or indicators of an active attack that make it past perimeter defenses. Examples of new capabilities include:

  • Instantly Detect Suspicious DNS Behavior and Scans: Threat ID surfaces suspicious DNS and port scanning behavior patterns, allowing users to rapidly identify potential threats quickly and initiate a targeted investigation.
  • Proactively Manage Certificates and Ciphers: Threat ID delivers a complete map of encryption certificate strength and usage for accurate risk profiling. The bundle automatically identifies weak ciphers and determines how they are being used to better assess risk. The bundle also tracks expiring, expired, and wildcard certificates that could put data at risk or impact service delivery, and audits usage of non-compliant and outdated transport layer security protocols such as SSLv3 or TLSv1.0.
Through the ExtraHop integration with ServiceNow, these types of anomalies automatically trigger alerts, kicking off a workflow in ServiceNow so security and IT operations teams can easily quarantine an infected client.

"Organizations recognize that perimeter and signature-based security are no longer effective on their own," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With Threat ID, ExtraHop is delivering real-time network-level visibility and threat identification that can help all security stakeholders -- from security to IT ops -- stay ahead of potential threats."

The Threat ID bundle joins a constellation of extensible plug-ins from ExtraHop aimed at helping global enterprises improve their security posture with real-time insight and rapid remediation. The ExtraHop Ransomware bundle analyzes traffic from the SMB/CIFS network protocol to detect known ransomware file extensions and behavior patterns associated with the malware. The ExtraHop Active Directory bundle tracks user accounts, computer accounts, DNS, LDAP, global catalog, and group policy loads to help ensure security and compliance. Together, the Threat ID, Ransomware, and Active Directory bundles address critical blind spots in today's IT environments and enable organizations to quickly enhance their security posture.

Published Wednesday, July 12, 2017 10:07 AM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<July 2017>
SuMoTuWeThFrSa
2526272829301
2345678
9101112131415
16171819202122
23242526272829
303112345