Story image

Endace joins IBM Security app exchange community

15 Jan 2019

Network recording and analytics hosting company Endace has launched the EndaceProbe integration with IBM Security to enable customers to retrace detailed, step-by-step actions of an attacker to accelerate forensic investigation.

EndaceProbe Network Analytics Platform captures, indexes, and stores network traffic with 100% accuracy while hosting a variety of network security and performance monitoring applications in Application Dock, EndaceProbe’s built-in hosting environment.

The new application is available to the security community through IBM Security App Exchange, a marketplace where developers across the industry can create applications based on IBM Security technologies.

As threats are evolving faster than ever, collaborative development amongst the security community will help organisations adapt quickly and speed innovation in the fight against cybercrime.

EndaceProbe leverages IBM Security QRadar, the company’s security intelligence platform, which analyses data across an organisation’s IT infrastructure in real-time to identify potential security threats.

Leveraging QRadar’s open application programming interfaces (API), EndaceProbe allows Endace and IBM customers to understand and respond to network events, including everything from anomalous behaviour to insider and advanced threats.

Endace CEO Stuart Wilson says, “Corporate networks are more vulnerable than ever to an accelerating volume of threats, and security analysts need to understand what’s happened with a threat to accelerate security investigation and response.”

“Leveraging the Pivot-to-Vision API integration of EndaceProbes, analysts can click on an alert in QRadar to go directly to view the related packets in EndaceVision, the EndaceProbe’s built-in investigation tool, to see what’s happened so they can respond appropriately.”

Endace’s multifunctional Analytics Platform can host third-party network analytics applications while recoding a 100% accurate Network History, providing evidence for investigating cybersecurity threats, quantifying data breaches and analysing network or application performance problems.

Deploying a dedicated Analytics Platform enables agile deployment of analytics functions on-demand and dramatically reduces OPEX and CAPEX costs by consolidating data centre hardware.

Hosted analytics applications can analyse live traffic at full line rate, or use Playback to analyse historical traffic for powerful, back-in-time analysis. 

Endace’s customers include banks, hospitals, telcos, broadcasters, retailers, governments, and military. 

IBM’s security platform provides the security intelligence to help organisations holistically protect their people, data, applications, and infrastructure.

IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more.

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
Facebook fights fake news ahead of Africa elections
“We also show related articles from fact-checkers for more context and notify users if a story they have shared is rated as false.”
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.