LightCyber Makes Magna Even More BAD!

By CIOReview | Monday, January 18, 2016
754
1300
260

http://?utm_source=clicktrack&utm_medium=hyperlink&utm_campaign=linkinnews

FREMONT, CA: LightCyber, a Behavioral Attack Detection (BAD) solutions provider, has announced the release of Magna 3.1––an upgrade for its flagship Magna platform. The upgraded platform comes with improved attack detection capabilities that increase the efficiency of security operators to prevent breaches in organizations. "With this new release, we actually converge profiling context for the behavior of users, devices and the network," Gonen Fink, CEO of LightCyber.

In the event of a hacking attack, after gaining access to an organization’s network using malware, hackers employ reconnaissance activities to obtain user credentials so as to access important files and other databases. As the organizations slowly uncover that their security has been breached, the hacker will have got hold of all the confidential data. As a result, there is a need for the organizations to combine analytics for users as well as devices and networks, to detect malicious activity.

Magna 3.1 supports user-entity behavioral profiling in addition to the existing network and endpoint entity profiling, thus providing the industry’s first integrated Behavioral Attack Detection platform. The platform is further strengthened by the release of the Network-to-Process-Association (N2PA), which provides the security analyst a completely automated, comprehensive investigative data about the observed attack behavior. "So we cover the entire attack lifecycle from network, endpoint and user perspective in contrast with the classic user behavior analytics approach that typically just looks at what credentials are involved," Fink said.

Magna 3.1 also includes a Malicious File Termination (MFT) feature which automatically terminates a process upon detecting suspicious activity while also keeping track on every device on the network–– a printer, router or user desktop system. "We already map the network behavior of all devices, and now we provide the user credential context for how the device is being used," Fink said. Moreover, by combining normal network behavior and user context, Magna 3.1 is armed to detect more attacks.