

HYAS brings security threat detection, response to production networks
source link: https://www.csoonline.com/article/3661435/hyas-brings-security-threat-detection-response-to-production-networks.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

HYAS brings security threat detection, response to production networks
HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

Bringing threat detection and response capabilities to production networks, cybersecurity company HYAS Infosec is set to release a new, specifically targeted security solution dubbed HYAS Confront.
Aiming to address security issues on cloud-based production networks — which the company defines as the infrastructure behind businesses' outward-facing, revenue-driving applications — the software is designed to continuously monitor traffic to uncover anomalies and enhance risk mitigation.
"HYAS is focused on providing our clients and customers with the solutions that they require for true business resiliency, continuity, and risk management," says HYAS CEO David Ratner. HYAS Confront "has already been proven in live deployments" among some customers, Ratner says, and will be available in general availability to customers in June.
HYAS Confront uses a supervised learning model
HYAS Confront records all internal machine-to-machine communication in the production network as well as the communications leaving the network. Using this knowledge, HYAS analyzes communication destinations, traffic patterns, and related data to initially determine what may be anomalous.
"Continual analysis combined with human intervention enables HYAS to determine a baseline of 'standard' operations which future anomalies can be compared against," says Ratner. Confront then utilizes "advanced threat assessment and machine learning" to continuously monitor for anomalies and uncharacteristic activity that break from pre-established patterns.
"Standard" operations are analogous to "labels" in supervised machine learning models, which are used in training data to help the model identify and register patterns and later match and validate test data.
HYAS advertises a so-called passive deployment for Confront, meant to provide continuous and proactive monitoring of issues, without affecting availability, performance, or latency.
Additionally, Confront several additional key benefits, HYAS says, including integrations with existing security components, improved network hygiene, instant deployment, and real-time insights.
"This is a very interesting addition to an already-strong suite of HYAS Infosec security solutions," says Gary McAlum, a senior analyst at TAG Cyber. "The focus on the enterprise production network, in addition to the surrounding infrastructure, is intriguing."
Confront’s unique approach, though, may not be without challenges, McAlum says.
"It will be challenging, but not impossible, to show risk reduction value while functioning passively in the production network without affecting performance or injecting latency," McAlum points out. "Another challenge will be the incident response. If a threat event is flagged in production, a careful process for investigating and taking appropriate action will be extremely important to avoid negatively impacting business operations."
Also challenging for Confront will be navigating through an already complex and overlapping security ecosystem wherein enterprise security teams are managing many security tools and capabilities.
"HYAS will need to clearly articulate the operational ROI by adding yet another layer into an already-crowded security stack. Better yet, if they can demonstrate the ability to replace multiple existing tools with this product, without decreasing operational effectiveness, that could be a very compelling approach when meeting with security leaders," McAlum adds.
Recommend
-
5
Endpoint Detection and Response: All You Need to Know About EDR SecurityInside Out Security Blog » Data Security » Endpoint Detecti...
-
7
Network threat detection and response startup Netography raises $45M ...
-
15
Security Engineer Intern, Threat Detection & Response (TDR), F2Security Engineer Intern, Threat Detection & Response (TDR), F2Security Engineer...
-
6
Anvilogic’s threat detection, investigation and response platform aims to improve SOCs
-
5
How data detection and response are becoming cloud security essentials
-
10
NAKIVO Blog > Office 365 Administration and Deployment >...
-
5
How identity threat detection and response are the latest tools in cybersecurity arsenals
-
6
News Skyhawk launches platform to provide threat detection and response across multi-cloud environments...
-
6
News Dell beefs up security portfolio with new threat detection and recovery tools
-
9
So far, there's been a lot of talk about the threat that generative AI (aka GenAI) poses in the hands of bad actors. But just...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK