|By Business Wire||
|April 17, 2014 09:30 AM EDT||
Observable Networks, an emerging leader of network security technology and advanced threat detection services, today officially entered the IT security market, empowering organizations to readily understand normal and abnormal device behaviors in their networks. Observable’s Continuous Device Profiling (CDP) technology and cloud-based service platform uses real-time traffic sensors and automated security analytics to continuously model all devices on networks of any size. Observable’s solution is indifferent to encryption and does not require recognition of threat signatures – a growing problem with current security technologies.
“For many companies, unmanaged endpoints like BYOD, copy machines, video cameras, and building controls are increasingly used as gateways for targeted attacks. Additionally, many successful attacks involve low tech approaches such as stealing credentials or exploiting physical access to IT assets,” said Bryan Doerr, CEO of Observable Networks. “Our service works a lot like a credit card suspicious activity alert system. We’re continuously looking at our client’s devices and their behaviors on the network, and because our platform acutely understands what is normal and abnormal, we can alert them quickly and with precision.”
Observable Networks focuses on the growing and diverse assets that comprise corporate networks and the unraveling of the security perimeter. Unlike signature-based mechanisms, Observable does not assume threats can be recognized since modern attacks are highly customized and stealth. Additionally, Observable addresses exploitable weaknesses in perimeter-based mechanisms – the notion of a boundary between what is good and bad. As companies incorporate cloud infrastructure, SaaS applications, data centers, mobile platforms, and integrate with customers, suppliers, and partners, Observable’s approach provides clear visibility into the behavior of all endpoints - managed and unmanaged - in today’s fragmented business network.
With no specialized hardware to purchase and no software agents to deploy, Observable’s service is available as a cost-effective software-as-a-service (SaaS) subscription – greatly simplifying deployment. With scalability ranging from 100 to Millions of devices, it is a crucial threat detector for any organization - providing a significant leap forward to a stronger security posture compared to traditional approaches.
Observable Networks enters the market at a time when technology has drastically upended the threat detection and security landscape. Traditional threat detection has been unable to keep up with multi-layered attacks resulting in some disturbing trends:
- 18% year-over-year increase in successful cyber-attacks
- 74% of key breech events taking weeks to months to detect
- 32-day average to resolve a detected breeches at an average cost of $11.6M
“It was clear that the inevitable rise of end-to-end encryption would "turn the lights off" on network security analysts. This observation, coupled with the limitations of signature-based mechanisms, inspired the creation of CDP, ” said Patrick Crowley, Observable Networks’ founder & CTO and associate professor of computer science at Washington University in St. Louis. “By monitoring and modeling all devices on the network, we enable customers to press the one advantage they have over adversaries - a continuous, unobstructed view of the devices on their network, and how those devices behave through time. By baselining and modeling all devices, CDP provides a durable network security mechanism, one whose value will grow through time.”
About Observable Networks
Observable Networks, Inc. is an emerging leader of network security technology and advanced threat detection services that identify compromised and misused networked devices currently escaping detection by network security tools. Observable’s Continuous Device Profiling (CDP) technology includes a cloud-based service platform incorporating automated security analytics and real-time traffic sensors to continuously model all devices on networks of any size, all the time. CDP is indifferent to encryption and does not use threat signatures. Observable empowers organizations to readily understand normal and abnormal device behaviors in their networks, helping them to identify compromised devices and facilitate faster remediation. Observable Networks is a privately held company headquartered in St. Louis, MO and has received institutional backing from the Vectis II fund, of which Stifel, Nicolaus & Company, Inc. is a co-General Partner. For more information, please visit www.observable.net.
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Oct. 13, 2015 05:00 AM EDT Reads: 1,083
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
Oct. 13, 2015 04:45 AM EDT Reads: 203
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Oct. 13, 2015 04:45 AM EDT Reads: 154
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
Oct. 13, 2015 04:00 AM EDT Reads: 176
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 13, 2015 04:00 AM EDT Reads: 679
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 13, 2015 03:00 AM EDT Reads: 403
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Oct. 13, 2015 03:00 AM EDT Reads: 258
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 13, 2015 03:00 AM EDT Reads: 324
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
Oct. 13, 2015 02:30 AM EDT Reads: 185
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 13, 2015 02:00 AM EDT Reads: 391
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Oct. 13, 2015 02:00 AM EDT Reads: 657
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 13, 2015 02:00 AM EDT Reads: 314
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Oct. 13, 2015 02:00 AM EDT Reads: 350
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Oct. 13, 2015 01:00 AM EDT Reads: 375
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Oct. 13, 2015 12:45 AM EDT Reads: 851