IN THE PRESS: 7 Ways Investors Can Gain Clarity While Conducting Technical Due Diligence  Read More

NEW FUNDING: Why Volition Capital Invested in Doing Things Media (DTM)  Read More

VOLITION NEWS: Claude de Jocas in Built In Boston: Local VC Firm Fuels Startups Targeting Underserved Groups Despite Funding Slowdown  Read More

NEW FUNDING: Why We Invested in US Mobile  Read More

SCALING SUCCESS PODCAST: Sean Cantwell interviews Paul Melchiorre for Scaling Success  Read More

Categories:
Categories:
Categories:
Portfolio News

Securonix Announces New Network Traffic Analysis Product Offering

Lindsey Eckerd
Securonix Wins Big At Cybersecurity Excellence Awards 2018

Read full article on Securonix.com

Highlights:

  • Securonix announced the launch of its network traffic analysis (NTA) product that will provide bundled Corelight network sensors and use case content. Securonix NTA will be an integral part of the Securonix SIEM product, enabling customers to deploy a single solution that correlates network traffic, security events, and entity context to detect and respond to the most advanced insider and cyber threats.
  • With Securonix NTA, the Securonix SIEM platform now provides customers a single platform that monitors and correlates network traffic events, security events, and user activities (with built in UEBA) to detect the most advanced threats. The solution uses the MITRE ATT&CK framework to help incident responders organize the indicators of compromise (IOCs) from NTA, SIEM, and UEBA and to help them break or interrupt an attacker’s kill chain, and to surface the highest risk threats to their environment.
  • “Cyber threats continue to become more advanced and complex every day. Looking at user activity, security logs, and network events in silos may result in advanced threats going undetected,” said Nitin Agale, SVP of strategy and marketing at Securonix. “By combining SIEM, UEBA, NTA and SOAR functionality in a single platform, Securonix is providing customers with fully integrated solution for effectively detecting, investigating and responding to advanced threats.”

Continue reading.

Similar Articles