SOURCE: 21CT

21CT

February 06, 2014 05:00 ET

Network Behavior Analysis and Visualization to Detect the 12 Indicators of Network Compromise

Security Analytics and Network Visualization Enable Analysts to Find the Patterns That Can Reveal Indicators of Compromise and Accelerate Detection

AUSTIN, TX--(Marketwired - Feb 6, 2014) - Every day, security analysts spend critical resources tracking perimeter defense alerts, responding to end-point alerts and running down user reports of suspicious activity. Yet, alerts help to mitigate only the known problems; hiding in the network among disparate data sources are more -- and potentially more dangerous -- unknown threats. To uncover these unknowns, security analysts must be able to recognize telltale malicious network behavior patterns quickly, which is why 21CT released a new Security Insight Brief outlining the 12 indicators of compromise. To learn more or download the report, visit http://www.21CT.com/12Indicators.

There are four categories of malicious behavior that should concern organizations the most:

  • Human behavior, including alert visibility, return on intelligence, and social engineering;
  • Machine behavior, such as autonomous system behavior, policy violations, and Botnet C&C traffic;
  • Volumetric behavior, including DDoS noise reduction as well as unusual inbound and outbound traffic; and
  • Anomalous behavior such as geographic and protocol anomalies in addition to long-term trending.

Understanding these behaviors, what they are and why they are dangerous is a critical first step to stopping them. However, finding these behaviors hidden in network data is a challenge. With security analytics, analysts can fuse together disparate network data to visualize and uncover patterns of behavior that are indicative of network compromise. They can then quickly, and often automatically, identify and classify the behaviors to remediate infected and misconfigured systems or thwart ongoing attacks missed by the perimeter.

"You can't see the red flags and unknown threats in your network because the systems you have in place weren't designed to identify them on their own," said Mike Hamilton, director of technical marketing at 21CT. "To dig out the issues, organizations need the ability to easily combine data sets and uncover specific patterns. Our new Security Insight Brief reviews the 12 major indicators of compromise and helps security analysts determine how to identify them so that they can be found before damage is done."

In addition to the Security Insight Brief, 21CT will release new analytics for LYNXeon designed not only to identify these 12 indicators of compromise before they impact the business but also, in some cases, to prevent the compromise from happening. To see the latest analytics as they are released, visit http://www.21CT.com/IOCs.

About 21CT
Using LYNXeon from 21CT, organizations rapidly fuse enriched and disparate data; analyze and visualize it to find previously undetectable patterns; and gain operational insight to fight fraud, cyberattacks and criminal behavior. For more information and to find out how investigative analytics and pattern detection can secure your world, visit http://www.21ct.com.

Contact Information

  • Media Contacts:
    Julie Crotty
    Attune Communications
    978-877-0053
    Email Contact