Welcome!

News Feed Item

Observable Networks Launches Cloud-Based Network Security Service

Observable Networks, an emerging leader of network security technology and advanced threat detection services, today officially entered the IT security market, empowering organizations to readily understand normal and abnormal device behaviors in their networks. Observable’s Continuous Device Profiling (CDP) technology and cloud-based service platform uses real-time traffic sensors and automated security analytics to continuously model all devices on networks of any size. Observable’s solution is indifferent to encryption and does not require recognition of threat signatures – a growing problem with current security technologies.

“For many companies, unmanaged endpoints like BYOD, copy machines, video cameras, and building controls are increasingly used as gateways for targeted attacks. Additionally, many successful attacks involve low tech approaches such as stealing credentials or exploiting physical access to IT assets,” said Bryan Doerr, CEO of Observable Networks. “Our service works a lot like a credit card suspicious activity alert system. We’re continuously looking at our client’s devices and their behaviors on the network, and because our platform acutely understands what is normal and abnormal, we can alert them quickly and with precision.”

Observable Networks focuses on the growing and diverse assets that comprise corporate networks and the unraveling of the security perimeter. Unlike signature-based mechanisms, Observable does not assume threats can be recognized since modern attacks are highly customized and stealth. Additionally, Observable addresses exploitable weaknesses in perimeter-based mechanisms – the notion of a boundary between what is good and bad. As companies incorporate cloud infrastructure, SaaS applications, data centers, mobile platforms, and integrate with customers, suppliers, and partners, Observable’s approach provides clear visibility into the behavior of all endpoints - managed and unmanaged - in today’s fragmented business network.

With no specialized hardware to purchase and no software agents to deploy, Observable’s service is available as a cost-effective software-as-a-service (SaaS) subscription – greatly simplifying deployment. With scalability ranging from 100 to Millions of devices, it is a crucial threat detector for any organization - providing a significant leap forward to a stronger security posture compared to traditional approaches.

Observable Networks enters the market at a time when technology has drastically upended the threat detection and security landscape. Traditional threat detection has been unable to keep up with multi-layered attacks resulting in some disturbing trends:

  • 18% year-over-year increase in successful cyber-attacks
  • 74% of key breech events taking weeks to months to detect
  • 32-day average to resolve a detected breeches at an average cost of $11.6M

“It was clear that the inevitable rise of end-to-end encryption would "turn the lights off" on network security analysts. This observation, coupled with the limitations of signature-based mechanisms, inspired the creation of CDP, ” said Patrick Crowley, Observable Networks’ founder & CTO and associate professor of computer science at Washington University in St. Louis. “By monitoring and modeling all devices on the network, we enable customers to press the one advantage they have over adversaries - a continuous, unobstructed view of the devices on their network, and how those devices behave through time. By baselining and modeling all devices, CDP provides a durable network security mechanism, one whose value will grow through time.”

About Observable Networks

Observable Networks, Inc. is an emerging leader of network security technology and advanced threat detection services that identify compromised and misused networked devices currently escaping detection by network security tools. Observable’s Continuous Device Profiling (CDP) technology includes a cloud-based service platform incorporating automated security analytics and real-time traffic sensors to continuously model all devices on networks of any size, all the time. CDP is indifferent to encryption and does not use threat signatures. Observable empowers organizations to readily understand normal and abnormal device behaviors in their networks, helping them to identify compromised devices and facilitate faster remediation. Observable Networks is a privately held company headquartered in St. Louis, MO and has received institutional backing from the Vectis II fund, of which Stifel, Nicolaus & Company, Inc. is a co-General Partner. For more information, please visit www.observable.net.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
Pulzze Systems was happy to participate in such a premier event and thankful to be receiving the winning investment and global network support from G-Startup Worldwide. It is an exciting time for Pulzze to showcase the effectiveness of innovative technologies and enable them to make the world smarter and better. The reputable contest is held to identify promising startups around the globe that are assured to change the world through their innovative products and disruptive technologies. There w...
SYS-CON Events announced today Telecom Reseller has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
To paraphrase someone famous, "The definition of insanity is to do something the same way over and over again and expect a different result". Humans are creatures of habit and when it comes to storage, old habits die hard. Why do we continue to put our faith in legacy storage providers when they haven't invented anything new in decades. Sure, they re-badge their products every couple of years to make their messaging look modern, but ultimately, it's the same old stuff with a new coat of lipsti...
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.