Welcome!

News Feed Item

At InfoSecurity Europe 2014 Learn How Pravail® Security Analytics’ Unique Looping Capability Identifies Heartbleed Attacks in Historic Data

Arbor Networks Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, today announced at the InfoSecurity Europe 2014 conference that they will be showcasing how Pravail® Security Analytics unique looping capability can be used to identify and establish an attack timeline for the recently disclosed and much discussed Heartbleed attacks. Visit Arbor Networks at Stand G90 this week for a demonstration.

Pravail Security Analytics can cost-effectively store packet captures for future reviews, and then loop that traffic to identify previously undetected threats using the latest threat intelligence. Looping is a unique feature of Pravail Security Analytics because it allows an organization to very rapidly look within their entire network, including the hardest to capture places, to reveal whether a vulnerability or intrusion has led to a successful breach of their network or data.

For example, now that the Heartbleed vulnerability has been identified, and protections have been updated, Pravail Security Analytics can loop old traffic to establish the attack timeline. These capabilities are all the more important as incident response and security operations teams are increasingly asked to quickly and accurately make calls as to when and how a network or key data has been breached, and what response and steps the organization needs to take next. The Economist Intelligence Unit recently conducted a global survey of CISOs and published a report, sponsored by Arbor, titled Cyber incident response: Are business leaders ready?. The report found that 40% of companies would like a better understanding of the potential threats facing their organization and only 17% felt fully prepared for an incident.

According to IT Harvest founder Richard Stiennon, in a white paper titled Security Analytics: A Required Escalation in Cyber Defense, “Pravail Security Analytics has broken new ground in security analytics functionality. The ability to replay captured traffic (looping) through an updated engine provides retroactive forensics that takes advantage of new intelligence as it becomes available. That, and the enhanced graphical data mining capability sets Arbor’s Pravail Security Analytics apart.”

Dynamic Incident Response & Forensics

Pravail Security Analytics leverages the Emerging Threats ET Pro Ruleset™, the benchmark in the industry. It also utilizes Arbor’s ATLAS Intelligence Feed (AIF), an extremely high-fidelity threat identification and remediation feed developed by Arbor’s Security Engineering and Response Team (ASERT). ASERT is one of the largest dedicated research organizations in the security industry, combining 25 security analysts with a diverse set of expertise, including Fortune 25 Computer Emergency Response Teams (CERTs) to former law enforcement, threat mitigation vendors and well-known malware researchers.

ASERT develops threat intelligence, complete with the security context customers require to detect and stop specific threats, and continuously enhances their security posture over time. In addition to the powerful combination of Emerging Threats and AIF, Pravail Security Analytics allows users to define their own threat signatures in snort format and have them executed on the platform. If your team has a bank of custom snort signatures that you use on your network, you can upload them and have them process alongside the Emerging Threats ET Pro Ruleset™ and the AIF feed.

“Determined, persistent and creative attackers are going to find a way in. The key is how quickly can network and security teams identify these intrusions, react and prevent exfiltration of corporate or customer data. In order to really understand subtle, advanced targeted attacks, enterprises need a complete record of all network traffic. They also need the highest fidelity threat intelligence, and as the Target breach has shown, alert fatigue is a clear and present danger for internal teams,” said Arbor Networks President Matthew Moynahan.

Flexible Deployment Options

Last month, Arbor announced the availability of Pravail Security Analytics in the Cloud along with a free trial that enables users to quickly analyze their own network packet captures for threats, anomalies and misuse. The free trial allows users to upload up to 1 GB of their own data for thirty days, demonstrating how powerful data visualizations can surface clear and actionable intelligence. For organizations that cannot upload their packet captures to the Cloud due to compliance or regulatory reasons, or wish to process data in real-time, the on-premise solution is an ideal alternative.

  • Pravail Security Analytics Cloud - Data is uploaded in the form of packet captures and processed in the cloud.
  • On-Premise Collector to Cloud - A collector is deployed on your network and processes real-time data streams. The results are encrypted and streamed to the cloud where they are analyzed.
  • On-Premise Collector to On-Premise Controller - in this model nothing leaves your network. Data is collected and processed within your network and streamed to a Controller within your network.

About Arbor Networks

Arbor Networks, Inc. helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,’ making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and reduce the risk to their business.

To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor’s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow, ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...