Network Traffic Analysis: Real-time Identification, Detection and Response to Threats

Posted by MantisNet on Jun 25, 2019 10:14:53 AM

Digital transformation and the growing complexity of IT environments present new vulnerabilities that can be exploited by attackers for reconnaissance, delivering malicious payloads or to exfiltrate data. Using live network traffic for analysis to expose hidden malicious or anomalous activities and security threats among the complexity is fundamental for improved detection and response. So much so, that Gartner recently published an inaugural market guide for network traffic analysis (NTA), to help organizations understand what to look for (more on that later).

What is network traffic analysis (NTA)?

Network traffic analysis uses network communications and their protocols for detection, identification and analysis of cybersecurity threats and potential operational issues. As you’ll read, we propose doing this in real-time, with wire-speed network data and analytics to meet the demands of digital business and to gain an edge on reducing mean time to detect (MTTD) / mean time to respond (MTTR).

Read More

Tags: cyber security, Real-Time Monitoring, mantis

Interactive Remediation - an emerging, real-time, capability for cybersecurity and network teams

Posted by MantisNet on Apr 1, 2019 7:00:00 AM

Today we announce the publication of our Special Report: Reduce Risk with Real-time Interactive Remediation of Network Traffic. It contains a discussion and explanation of the emerging capabilities of technologies to enable real-time decisions based on live / streaming network traffic data to reduce cybersecurity and operational risk.

Read More

Tags: cyber security, Data-In-Motion, mantis

The next phase in continuous cyber defense and what it means

Posted by MantisNet on Mar 25, 2019 12:42:37 PM

The next phase in continuous cyber defense and what it means

An interview with Kim Watson, Technical Director of the Integrated Adaptive Cyber Defense (IACD) initiative at JHU APL

Is it possible to get access to, and process all the relevant information available, to improve cyber defense? The threat landscape continues to evolve, new and ever more sophisticated TTPs (tools, techniques and procedures) are utilized by adversaries while cybersecurity teams have a new arsenal of AI/ML and orchestration tools, that may offer relief for overwhelmed security staff whose efforts are gaining increased attention by the c-suite.

Read More

Tags: mantis

Understanding the Difference Between Network Monitoring and Network Security Monitoring

Posted by MantisNet on Feb 26, 2019 2:42:10 PM

As technologies advance and enterprise networks expand, administrators accountable for the overall health and performance of infrastructure accumulate more and more responsibility. CIOs are continually analyzing the problem of how to better monitor and secure the activity within their organization’s network.

Read More

Tags: Real-Time Monitoring, Data-at-Rest, Data-In-Motion

5G & IoT Networks: Moving Network Monitoring and Analysis to the Edge

Posted by MantisNet on Feb 12, 2019 2:21:56 PM

MantisNet's recently published whitepaper, Solutions for the Next Generation of 5G and IoT Network Deployments, focuses on the enablement of real-time network intelligence, monitoring and analysis at the edge. This topic is very timely as telecommunications carriers are readying their fifth generation, or 5G, network deployments. The promise of higher speeds, lower latency and greater throughput has arrived to deliver improved digital experiences and further enable the continual growth of Internet of Things (IoT) connectivity and interactions.

Read More

Tags: Real-Time Monitoring, mantis

NetOps and SecOps in the Data plane

Posted by MantisNet on Jan 15, 2019 11:35:14 AM

We had the pleasure of supporting the Software Engineering Institute at Carnegie Mellon University’s conference, FloCon: Using Data to Defend. The presentations and discussions at the event provided validation that changes are coming to network and cyber security. More mathematical solutions are being developed to fuel machine learning and algorithms to combat malicious and other network traffic of interest. If you missed the event, an overview and video of our presentation is below.

Read More

Tags: network engineering, Real-Time Monitoring, DNS Monitoring, Data-In-Motion, mantis

The Biggest Dilemma CIOs are Facing Heading Into 2019

Posted by Peter Dougherty on Nov 14, 2018 6:06:54 PM

2019 is right around the corner, and CIOs are prepping for the new year. Specifically, CIOs are making plans as it relates to cybersecurity and data privacy management. Grappling with how to make informed business decisions with real-time technologies, increasing the use of orchestration and automation along with continuous monitoring, to enable real-time detection, decisioning and remediation.

Read More

FloCon 2019 and MantisNet

Posted by MantisNet on Nov 8, 2018 3:04:54 PM

MantisNet is a proud sponsor and participant at the upcoming FloCon 2019 conference in New Orleans, January 7-10, 2019.

We were excited to be accepted as a speaker and sponsor for the annual Software Engineering Institute at Carnegie Mellon University’s event. The theme for FloCon 2019 is ‘Using Data to Defend’ and the forum to “explore large-scale, next-generation data analytics in support of security operations” fits squarely within the core mission and vision of MantisNet.

Read More

Tags: Real-Time Monitoring, mantis

The Ultimate Cyber Security Strategy: Is Data-in-Motion The Answer?

Posted by MantisNet on Jul 25, 2018 4:02:42 PM

Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems. 

Read More

Tags: cyber security, Real-Time Monitoring, Data-at-Rest, Data-In-Motion, mantis

Cyber Security Strategies that Make Data-at-Rest Obsolete

Posted by MantisNet on May 22, 2018 4:06:43 PM

The world of cyber security is complex and misunderstood by a majority of the public. Even in IT, few people understand the complexities of a sophisticated cyber attack. It's this lack of understanding and the low number of experts in the field that give cyber attackers an advantage. 

Read More

Tags: cyber security, Data-at-Rest