spot_img

Date:

Share:

NETSCOUT Expands Automated Threat Detection and Response Capabilities

NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of observability, AIOps, cybersecurity, and DDoS attack protection solutions, has announced Adaptive Threat Analytics, a new enhancement to its Omnis Cyber Intelligence Network Detection and Response (NDR) solution, designed to improve incident response and reduce risk. Adaptive Threat Analytics enables security teams to investigate, hunt, and respond to cyber threats more rapidly.

Cybersecurity professionals face a challenge in the race against time to detect and respond appropriately to cyber threats before it is too late. Alert fatigue, increasing alert volume, fragmented visibility from siloed tools, and cunning AI-enabled adversaries create a compelling need for a faster and more effective response plan. McKinsey & Company noted last year that despite a decline in response time to cyber-related risks in recent years, organisations still take an average of 73 days to contain an incident.

In the threat detection and incident response process, comprehensive north-south and east-west network visibility plays a critical role in all phases, but none more so than the ‘Analyse’ phase between ’Detection’ and ‘Response.’ Adaptive Threat Analytics utilises continuous network packet capture and local storage of metadata and packets independent of detections, built-in packet decodes, and a flexible ad hoc querying language, enabling more rapid threat investigation and proactive hunting. This provides SOC analysts with the specific knowledge needed to determine and execute the proper response more efficiently.

“Network environments continue to become more disparate and complex. Bad actors exploit this broadened attack surface, making it difficult for security teams to respond quickly and accurately,” said John Grady, principal analyst, cybersecurity, at Enterprise Strategy Group. Due to this, continuous, unified, packet-based visibility into north-south and east-west traffic has become essential for effective and efficient threat detection and incident response.”

Omnis Cyber Intelligence’s AI-driven correlation stitches disparate events into cohesive, high-fidelity incidents, providing a holistic, actionable view of the entire attack chain. It delivers superior scalability and cost-effective NDR capabilities across complex IT environments and easily integrates into your cybersecurity ecosystems, such as your SIEM, SOAR, or XDR.

“Security teams often lack the specific knowledge to understand exactly what happened to be able to choose the best response,” stated Jerry Mancini, senior director, Office of the CTO, NETSCOUT. “Omnis Cyber Intelligence with Adaptive Threat Analytics provides ‘big picture’ data before, during, and after an event that helps teams and organisations move from triage uncertainty and tuning to specific knowledge essential for reducing the mean time to resolution.”

Visit our website to learn more about how NETSCOUT’s Adaptive Threat Analytics is accelerating incident response with faster analyses and investigations.

spot_img
spot_img

━ More like this

High-severity incidents at a minimum: Kaspersky experts reveal a steady decline over the years

According to the ‘Anatomy of a Cyber World: Global Report by Kaspersky Security Services’, there has been a noticeable decline in the percentage of high-severity incidents...

Kaspersky discovers new SparkCat variant bypassing App Store and Google Play security

 Kaspersky has identified a new variant of the SparkCat Trojan in the App Store and in Google Play — a year after the crypto-stealing...

Kaspersky uncovers CrystalX RAT which steals data and mocks its victims

The new remote access trojan (RAT) is capable not only of stealing information and fully spying on its victims, but also of making fun...

Hackers don’t wait – why your cybersecurity strategy shouldn’t either

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and Artificial...

From Data to Decisions: Threat Intelligence in SOC operations

Effective analysis starts with the essential questions “who, what, when, where, why and how” - that convert data into intelligence. In many ways, these...
spot_img