Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

LightCyber Enhances Breach Detection Platform

Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.

Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.

The recently announced Version 3.0 of LightCyber Magna platform brings two new features that extend the attack detection and remediation capabilities, the company said.

The Magna platform, which analyzes network traffic and endpoint information to detect compromised systems and stolen credentials, now includes new Network-to-Process Association (N2PA) technology which provides the ability to directly associate suspicious network traffic with a specific executable process or file on an endpoint via an agentless mechanism.

LightCyber LogoAdditionally, new Malicious File Termination (MFT) technology allows incident response teams to remotely delete a file once it is confirmed as a part of an active attack.

“With the addition of these two features, security operators will have even greater ability to efficiently detect active attacks, utilize automatically generated investigative data for incident response and rapidly stop the breach before damage is done,” the company said.

“Instead of using technical artifacts that might or might not be associated with an attack, LightCyber Magna employs behavioral profiling to identify anomalous attack behaviors that cybercriminals must use to successfully perpetrate their attack, including reconnaissance activities, lateral movements from machine to machine, external communications with command centers and, ultimately, data exfiltration.”

N2PA and MFT are now fully integrated into Magna Pathfinder, the agentless endpoint software subscription service, and extend existing Magna remediation capabilities, including integration with next generation firewalls (NGFW), network access control (NAC) protocols, and Microsoft Active Directory permissions.

LightCyber Magna Version 3.0 is scheduled to be available by the Summer 2015.

“Given the well-documented history of breaches at enterprises of all sizes over the last 24 months, it’s clear that sophisticated attackers with enough incentive can figure out how to penetrate even the most sophisticated security infrastructure,” said Jason Matlof, executive vice president, LightCyber. “Once a breach occurs, it is a race against time to find the intruder and stop the attack before theft or damage can occur.”

Advertisement. Scroll to continue reading.

In September 2014 LightCyber raised $10 million in a funding round led by Battery Ventures. 

Reading: Security Startups: Interview With LightCyber Co-Founder and CEO Giora Engel 

Related Resource: Using Active Breach Detection Against Advanced Attackers

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet