Solera Networks offers visibility into potential security breaches
Posted on 10 April 2013.
Bookmark and Share
Solera Networks unveiled the DeepSee BlackBox Recorder, which continuously and silently captures all network traffic - including packets, flows, files and applications.

In the event of a security breach, incident responders can leverage it to swiftly pinpoint the root cause and material impact, while applying precise and effective remediation.

The Solera DeepSee BlackBox Recorder provides incident responders and security service providers with an effective way to integrate Solera DeepSee into existing security infrastructure, providing the always-on ‘eyes and ears’ that investigators need to tap into at a moment’s notice.

The Recorder can be deployed as a DeepSee Virtual Appliance or as DeepSee Software. Unlike any other big data security intelligence and analytics offering, the DeepSee BlackBox Recorder is unique due to its ability to be deployed and installed at no initial cost – with a requirement to purchase a license only when incident responders “break the glass” to retrieve the captured security intelligence.

The BlackBox Recorder delivers effective incident response and combines big data security analytics, comprehensive threat intelligence and full security visibility to answer critical post-breach questions like: who compromised the system?; what systems and data were affected?; what is the root cause and material impact?; and are we sure it’s over and won’t happen again?.

the BlackBox Recorder applies big data security analytics, threat intelligence and full network visibility for:

Application discovery - classify more than 1,000 applications and thousands of metadata attributes, including content types and file names.

Real-time file extraction - automatically extract and analyze any file, including malicious file types.

Root Cause Explorer - create a timeline of suspect Web sessions, email and chat conversations—before, during and after a security breach.

Session reconstruction - obtain a full record of user session activity as it happened in real-time.

Reputation service - reveal the integrity of any IP address, file or email address.

Full layer 2-7 indexing - correlated analytics with direct drill-downs from layer 2 to 7.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //