Traditional breach detection tools rely on queries and require knowledge of what to search for, while incident response is labor intensive. Next generation approaches analyze communications behavior in real time to identify abnormal patterns that could indicate a security incident, without prior knowledge of attack signatures. This allows threats to be detected proactively by observing deviations from normal critical asset interactions over time. Contextual alerts generated from behavioral analytics reduce false positives and provide premium insight to prioritize and stop active security compromises.
1. TRADITIONAL
BREACH DETECTION
NEXT GENERATIONVS.
>>
Query-based tools
require a knowledge
of what to look for
Labor intensive
incident response
process
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
SEARCH FOR SIGNALS
IN THE NOISE
BREACH PREVENTION WITH
COMMUNICATION BEHAVIOR ANALYTICS
106 A V E R A G E
N U M B E R O F
NOTIFICATIONS
Generated by security infrastructures per day
APPROACH
>>
Store Now,
Analyze Later
Off-line Data Analysis Wire-Speed Streaming Analytics
CRITICAL ASSET
"Data lakes" quickly become "data swamps." Traditional security
infrastructure generates millions of alerts, without context.
MISSING VISIBILITY INTO
TYPICAL BEHAVIORS
OF CRITICAL ASSETS
OVER TIME
FORENSIC ANALYSIS BEHAVIORAL TRIPWIRE
Reporting on correlations and signature
matches does not indicate who is
behaving badly and what assets
are compromised.
Behaviors evaluated in real time to
effectively lock-down assets and stop
workarounds. Ability to “look back” over
time to identify periodicity.
HIGH
BELATED PROACTIVE
False Positives
DIFFICULT Prioritize Alerts Manually
Breach Awareness
ZERO
550 S Winchester Blvd., Suite 300
San Jose, CA 95128
info@sidebandnetworks.com
Devices, Users
and Nodes
Critical Data
Assets
East-West Network Communications
P E R
D A Y
A t t h e f r o n t l i n e t o g e n e r a t e
POSITIVE MAN-IN-THE-MIDDLE
P E R F O R M I N G A N A L Y T I C S
5 ALERTS
DATA
Data
Correlation
Noise
Features
Machine Learning
Signal
By looking at what matters the most – your keys to the
kingdom, we naturally reduce noise.
N E A R
Level of false positives alerts
Profiling & DetectionAUTOMATIC
Threat identification
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
RECEIVE PREMIUM
CONTEXTUAL ALERTS
R E S U L T I N G LOST IN ALL
THE NOISE.
COMPROMISED ENTITY ACTS BADLY
SIGNALS
WITH NO BEHAVIORAL CONTEXT
CONTEXT
AWARE!!
COMMUNICATION ANALYTICS
D E T E C T S B A D B E H AV I O R
W I T H I N S E C O N D S
TO STOPL O S S O F C R I T I C A L D A T A
C a t c h bad actors b e f o r e a b r e a c h !
FOCUSIMPACT
S O U R C E S
S i d e b a n d N e t w o r k s L a b Te s t R e s u l t s