Connect with us

Hi, what are you looking for?


Network Security

LightCyber Enhances Breach Detection Platform

Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.

Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.

The recently announced Version 3.0 of LightCyber Magna platform brings two new features that extend the attack detection and remediation capabilities, the company said.

The Magna platform, which analyzes network traffic and endpoint information to detect compromised systems and stolen credentials, now includes new Network-to-Process Association (N2PA) technology which provides the ability to directly associate suspicious network traffic with a specific executable process or file on an endpoint via an agentless mechanism.

LightCyber LogoAdditionally, new Malicious File Termination (MFT) technology allows incident response teams to remotely delete a file once it is confirmed as a part of an active attack.

“With the addition of these two features, security operators will have even greater ability to efficiently detect active attacks, utilize automatically generated investigative data for incident response and rapidly stop the breach before damage is done,” the company said.

“Instead of using technical artifacts that might or might not be associated with an attack, LightCyber Magna employs behavioral profiling to identify anomalous attack behaviors that cybercriminals must use to successfully perpetrate their attack, including reconnaissance activities, lateral movements from machine to machine, external communications with command centers and, ultimately, data exfiltration.”

N2PA and MFT are now fully integrated into Magna Pathfinder, the agentless endpoint software subscription service, and extend existing Magna remediation capabilities, including integration with next generation firewalls (NGFW), network access control (NAC) protocols, and Microsoft Active Directory permissions.

LightCyber Magna Version 3.0 is scheduled to be available by the Summer 2015.

Advertisement. Scroll to continue reading.

“Given the well-documented history of breaches at enterprises of all sizes over the last 24 months, it’s clear that sophisticated attackers with enough incentive can figure out how to penetrate even the most sophisticated security infrastructure,” said Jason Matlof, executive vice president, LightCyber. “Once a breach occurs, it is a race against time to find the intruder and stop the attack before theft or damage can occur.”

In September 2014 LightCyber raised $10 million in a funding round led by Battery Ventures. 

Reading: Security Startups: Interview With LightCyber Co-Founder and CEO Giora Engel 

Related Resource: Using Active Breach Detection Against Advanced Attackers

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...