News Feed Item
At InfoSecurity Europe 2014 Learn How Pravail® Security Analytics’ Unique Looping Capability Identifies Heartbleed Attacks in Historic Data
|By Business Wire
|April 29, 2014 12:00 AM EDT
Networks Inc., a leading provider of DDoS and advanced threat
protection solutions for enterprise and service provider networks, today
announced at the InfoSecurity Europe 2014 conference that they will be
showcasing how Pravail®
Security Analytics’ unique looping
capability can be used to identify and establish an attack timeline for
the recently disclosed and much discussed Heartbleed
attacks. Visit Arbor Networks at Stand G90 this week for a
Pravail Security Analytics can cost-effectively store packet captures
for future reviews, and then loop that traffic to identify previously
undetected threats using the latest threat intelligence. Looping is a
unique feature of Pravail Security Analytics because it allows an
organization to very rapidly look within their entire network, including
the hardest to capture places, to reveal whether a vulnerability or
intrusion has led to a successful breach of their network or data.
For example, now that the Heartbleed
vulnerability has been identified, and protections have been
updated, Pravail Security Analytics can loop old traffic to establish
the attack timeline. These capabilities are all the more important as
incident response and security operations teams are increasingly asked
to quickly and accurately make calls as to when and how a network or key
data has been breached, and what response and steps the organization
needs to take next. The Economist Intelligence Unit recently conducted a
global survey of CISOs and published a report, sponsored by Arbor,
incident response: Are business leaders ready?. The
report found that 40% of companies would like a better understanding of
the potential threats facing their organization and only 17% felt fully
prepared for an incident.
According to IT Harvest founder Richard Stiennon, in a white paper
Analytics: A Required Escalation in Cyber Defense, “Pravail
Security Analytics has broken new ground in security analytics
functionality. The ability to replay captured traffic (looping) through
an updated engine provides retroactive forensics that takes advantage of
new intelligence as it becomes available. That, and the enhanced
graphical data mining capability sets Arbor’s Pravail Security Analytics
Dynamic Incident Response & Forensics
Pravail Security Analytics leverages the Emerging Threats ET Pro
Ruleset™, the benchmark in the industry. It also utilizes Arbor’s
ATLAS Intelligence Feed (AIF), an extremely high-fidelity threat
identification and remediation feed developed by Arbor’s Security
Engineering and Response Team (ASERT). ASERT is one of the largest
dedicated research organizations in the security industry, combining 25
security analysts with a diverse set of expertise, including Fortune 25
Computer Emergency Response Teams (CERTs) to former law enforcement,
threat mitigation vendors and well-known malware researchers.
ASERT develops threat intelligence, complete with the security context
customers require to detect and stop specific threats, and continuously
enhances their security posture over time. In addition to the powerful
combination of Emerging Threats and AIF, Pravail Security Analytics
allows users to define their own threat signatures in snort
format and have them executed on the platform. If your team has a bank
of custom snort signatures that you use on your network, you can upload
them and have them process alongside the Emerging
Threats ET Pro Ruleset™ and the AIF feed.
“Determined, persistent and creative attackers are going to find a way
in. The key is how quickly can network and security teams identify these
intrusions, react and prevent exfiltration of corporate or customer
data. In order to really understand subtle, advanced targeted attacks,
enterprises need a complete record of all network traffic. They also
need the highest fidelity threat intelligence, and as the Target breach
has shown, alert fatigue is a clear and present danger for internal
teams,” said Arbor Networks President Matthew Moynahan.
Flexible Deployment Options
Last month, Arbor announced the availability of Pravail Security
Analytics in the Cloud along with a free
trial that enables users to quickly analyze their own network
packet captures for threats, anomalies and misuse. The free trial allows
users to upload up to 1 GB of their own data for thirty days,
demonstrating how powerful data visualizations can surface clear and
actionable intelligence. For organizations that cannot upload their
packet captures to the Cloud due to compliance or regulatory reasons, or
wish to process data in real-time, the on-premise solution is an ideal
Pravail Security Analytics Cloud - Data is uploaded in the form
of packet captures and processed in the cloud.
On-Premise Collector to Cloud - A collector is deployed on your
network and processes real-time data streams. The results are
encrypted and streamed to the cloud where they are analyzed.
On-Premise Collector to On-Premise Controller - in this model
nothing leaves your network. Data is collected and processed within
your network and streamed to a Controller within your network.
About Arbor Networks
Arbor Networks, Inc. helps secure the world’s largest enterprise and
service provider networks from DDoS attacks and advanced threats. Arbor
is the world’s leading provider of DDoS protection in the enterprise,
carrier and mobile market segments, according to Infonetics Research.
Arbor’s advanced threat solutions deliver complete network visibility
through a combination of packet capture and NetFlow technology, enabling
the rapid detection and mitigation of malware and malicious insiders.
Arbor also delivers market leading analytics for dynamic incident
response, historical analysis, visualization and forensics. Arbor
strives to be a “force multiplier,’ making network and security teams
the experts. Our goal is to provide a richer picture into networks and
more security context - so customers can solve problems faster and
reduce the risk to their business.
To learn more about Arbor products and services, please visit our
website at arbornetworks.com.
Arbor’s research, analysis and insight, together with data from the
ATLAS global threat intelligence system, can be found at the ATLAS
Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow,
ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo
and Arbor Networks: Smart. Available. Secure. are all trademarks of
Arbor Networks, Inc. All other brand names may be trademarks of their
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics.
In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 25, 2016 11:45 AM EDT Reads: 1,627
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open.
Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Sep. 25, 2016 11:30 AM EDT Reads: 4,307
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams.
In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 25, 2016 11:30 AM EDT Reads: 1,490
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT.
In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 25, 2016 11:00 AM EDT Reads: 1,546
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Sep. 25, 2016 11:00 AM EDT Reads: 1,481
I’m going to cry tonight, long and hard. I’ll do so as I remember and mourn Jeremy Geelan.
I knew Jeremy for almost 20 years, from the time he showed up one day at Cloud Expo’s headquarters in Bergen County, New Jersey, and went to work. The show wasn’t called Cloud Expo then, of course – it was still known as Java Edge, a pioneering event that grabbed developers, architects, and enterprise IT users alike for twice-yearly confabs.
Jeremy didn’t have a job there, or even a job offer. He was s...
Sep. 25, 2016 10:45 AM EDT Reads: 3,594
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom.
China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Sep. 25, 2016 10:30 AM EDT Reads: 1,688
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Sep. 25, 2016 10:15 AM EDT Reads: 824
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related?
In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
Sep. 25, 2016 10:00 AM EDT Reads: 943
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself.
Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive.
In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
Sep. 25, 2016 10:00 AM EDT Reads: 876
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production.
He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captu...
Sep. 25, 2016 10:00 AM EDT Reads: 996
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud.
In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Sep. 25, 2016 10:00 AM EDT Reads: 1,336
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming.
For more information, visit http://www.pulzzesystems.com.
Sep. 25, 2016 09:45 AM EDT Reads: 1,765
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 25, 2016 09:00 AM EDT Reads: 1,538
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 25, 2016 08:15 AM EDT Reads: 1,478