Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Vectra Introduces the Industry’s First Privilege-Aware Network Detection and Response Solution to Strengthen the Enforcement of Zero Trust

New Privileged Access Analytics Drives Visibility into Privileged Entities and Detects Malicious Interactions to Mitigate the Single Biggest Threat to Critical Data

Vectra, the leader in network threat detection and response, announced that Privileged Access Analytics (PAA) are available with the Cognito platform to monitor the interactions between user accounts, services and hosts, and provide continuous visibility and assessment of privileges required to enforce zero trust.

A traditional access-based approach to zero trust relies on one-time security gating decisions that use a predefined list of privileged identities. This approach is fundamentally flawed when cyberattackers steal credentialed access or have escalated privileges.

“We must have visibility into what the entity – the user, the executable, the device, the network connection and so on – is doing once it gains access,” according to Neil MacDonald, Gartner distinguished VP analyst and author of the Seven Imperatives to Adopt a CARTA Strategic Approach[1] report. “How is it behaving? Does the entity or its behaviors represent excessive risk? If so, then we should have the ability to detect this, confirm that it is real, prioritize it and take action.”

Read More: Taiwan VR Productions Shine on Global Stage

Related Posts
1 of 40,761

With PAA, the Cognito platform continuously monitors the behaviors of user accounts, services and hosts once they gain access to and operate on the network. As a result, Cognito delivers both a continuous real-time assessment of their privilege levels by scoring their behaviors for threat and certainty, and a risk-level prioritization for them. This empowers security teams with the right information to take quick action against the malicious use of privilege across cloud and hybrid environments.

“The real-time assessment of trust is performed by continuously observing the behavior of user accounts, services and hosts on the network,” said Dr. Jacob Sendowski, director of product management at Vectra. “Now, when privileged credentials are compromised and abused, the new suite of Cognito PAA detection models are able to uniquely determine the malicious use of privilege in real-time.”

Read More: ADCB Launches Real Time Trade Finance For Customers on dltledgers Blockchain Platform

“Privileged Access Analytics gives me continuous visibility into the accounts, services and hosts that are most valuable to me,” said Milos Pesic, cyber security specialist at ED&F Man Holdings Ltd., an employee-owned agricultural commodities merchant with 7,000 people in 60 countries. “We can easily scrutinize the behaviors on each to see if they represent a significant risk to our organization. This has significantly decreased our time to investigate from minutes to seconds.”

PAA is immediately available in the Cognito platform as a suite of detection models in Cognito Detect and as searchable security enrichments to network metadata in Cognito Stream and Cognito Recall. Enforcement can be accomplished through native integrations with endpoint detection and response (EDR), security information and event management (SIEM) systems and orchestration tools. Custom integration is available by accessing attributes through the Cognito REST API.

Read More: AiThority Interview with Jonas Ryberg, VP of Digital Globalization Services at Pactera Technology International

3 Comments
  1. Copper scrap industry says

    Copper scrap volume forecasting Copper scrap seller Metal waste processing center
    Copper cable weight and measurements, Industrial metal waste disposal, Copper alloy ingot recycling

  2. Iron scrap dealers says

    Metal recoveryservices Ferrous metal buyback Iron scrap brokerage

    Ferrous metal sellers, Iron waste reclaiming services, Urban metal scavenging

  3. Copper scrap trading network says

    Copper scrap cleaning Domestic copper scrap market Metal waste inventory
    Copper cable scrap treatment, Scrap metal repurposing, Copper scrap sustainability certification

Leave A Reply

Your email address will not be published.