SYS-CON MEDIA Authors: Bob Gourley, Sandi Mappic, Eric Brown, RealWire News Distribution, Kevin Benedict

News Feed Item

At InfoSecurity Europe 2014 Learn How Pravail® Security Analytics’ Unique Looping Capability Identifies Heartbleed Attacks in Historic Data

Arbor Networks Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, today announced at the InfoSecurity Europe 2014 conference that they will be showcasing how Pravail® Security Analytics unique looping capability can be used to identify and establish an attack timeline for the recently disclosed and much discussed Heartbleed attacks. Visit Arbor Networks at Stand G90 this week for a demonstration.

Pravail Security Analytics can cost-effectively store packet captures for future reviews, and then loop that traffic to identify previously undetected threats using the latest threat intelligence. Looping is a unique feature of Pravail Security Analytics because it allows an organization to very rapidly look within their entire network, including the hardest to capture places, to reveal whether a vulnerability or intrusion has led to a successful breach of their network or data.

For example, now that the Heartbleed vulnerability has been identified, and protections have been updated, Pravail Security Analytics can loop old traffic to establish the attack timeline. These capabilities are all the more important as incident response and security operations teams are increasingly asked to quickly and accurately make calls as to when and how a network or key data has been breached, and what response and steps the organization needs to take next. The Economist Intelligence Unit recently conducted a global survey of CISOs and published a report, sponsored by Arbor, titled Cyber incident response: Are business leaders ready?. The report found that 40% of companies would like a better understanding of the potential threats facing their organization and only 17% felt fully prepared for an incident.

According to IT Harvest founder Richard Stiennon, in a white paper titled Security Analytics: A Required Escalation in Cyber Defense, “Pravail Security Analytics has broken new ground in security analytics functionality. The ability to replay captured traffic (looping) through an updated engine provides retroactive forensics that takes advantage of new intelligence as it becomes available. That, and the enhanced graphical data mining capability sets Arbor’s Pravail Security Analytics apart.”

Dynamic Incident Response & Forensics

Pravail Security Analytics leverages the Emerging Threats ET Pro Ruleset™, the benchmark in the industry. It also utilizes Arbor’s ATLAS Intelligence Feed (AIF), an extremely high-fidelity threat identification and remediation feed developed by Arbor’s Security Engineering and Response Team (ASERT). ASERT is one of the largest dedicated research organizations in the security industry, combining 25 security analysts with a diverse set of expertise, including Fortune 25 Computer Emergency Response Teams (CERTs) to former law enforcement, threat mitigation vendors and well-known malware researchers.

ASERT develops threat intelligence, complete with the security context customers require to detect and stop specific threats, and continuously enhances their security posture over time. In addition to the powerful combination of Emerging Threats and AIF, Pravail Security Analytics allows users to define their own threat signatures in snort format and have them executed on the platform. If your team has a bank of custom snort signatures that you use on your network, you can upload them and have them process alongside the Emerging Threats ET Pro Ruleset™ and the AIF feed.

“Determined, persistent and creative attackers are going to find a way in. The key is how quickly can network and security teams identify these intrusions, react and prevent exfiltration of corporate or customer data. In order to really understand subtle, advanced targeted attacks, enterprises need a complete record of all network traffic. They also need the highest fidelity threat intelligence, and as the Target breach has shown, alert fatigue is a clear and present danger for internal teams,” said Arbor Networks President Matthew Moynahan.

Flexible Deployment Options

Last month, Arbor announced the availability of Pravail Security Analytics in the Cloud along with a free trial that enables users to quickly analyze their own network packet captures for threats, anomalies and misuse. The free trial allows users to upload up to 1 GB of their own data for thirty days, demonstrating how powerful data visualizations can surface clear and actionable intelligence. For organizations that cannot upload their packet captures to the Cloud due to compliance or regulatory reasons, or wish to process data in real-time, the on-premise solution is an ideal alternative.

  • Pravail Security Analytics Cloud - Data is uploaded in the form of packet captures and processed in the cloud.
  • On-Premise Collector to Cloud - A collector is deployed on your network and processes real-time data streams. The results are encrypted and streamed to the cloud where they are analyzed.
  • On-Premise Collector to On-Premise Controller - in this model nothing leaves your network. Data is collected and processed within your network and streamed to a Controller within your network.

About Arbor Networks

Arbor Networks, Inc. helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,’ making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and reduce the risk to their business.

To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor’s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow, ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.