Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.
The recently announced Version 3.0 of LightCyber Magna platform brings two new features that extend the attack detection and remediation capabilities, the company said.
The Magna platform, which analyzes network traffic and endpoint information to detect compromised systems and stolen credentials, now includes new Network-to-Process Association (N2PA) technology which provides the ability to directly associate suspicious network traffic with a specific executable process or file on an endpoint via an agentless mechanism.
Additionally, new Malicious File Termination (MFT) technology allows incident response teams to remotely delete a file once it is confirmed as a part of an active attack.
“With the addition of these two features, security operators will have even greater ability to efficiently detect active attacks, utilize automatically generated investigative data for incident response and rapidly stop the breach before damage is done,” the company said.
“Instead of using technical artifacts that might or might not be associated with an attack, LightCyber Magna employs behavioral profiling to identify anomalous attack behaviors that cybercriminals must use to successfully perpetrate their attack, including reconnaissance activities, lateral movements from machine to machine, external communications with command centers and, ultimately, data exfiltration.”
N2PA and MFT are now fully integrated into Magna Pathfinder, the agentless endpoint software subscription service, and extend existing Magna remediation capabilities, including integration with next generation firewalls (NGFW), network access control (NAC) protocols, and Microsoft Active Directory permissions.
LightCyber Magna Version 3.0 is scheduled to be available by the Summer 2015.
“Given the well-documented history of breaches at enterprises of all sizes over the last 24 months, it’s clear that sophisticated attackers with enough incentive can figure out how to penetrate even the most sophisticated security infrastructure,” said Jason Matlof, executive vice president, LightCyber. “Once a breach occurs, it is a race against time to find the intruder and stop the attack before theft or damage can occur.”
In September 2014 LightCyber raised $10 million in a funding round led by Battery Ventures.
Related Resource: Using Active Breach Detection Against Advanced Attackers