Loading...
You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

Eastwind Networks Debuts Enterprise Breach Analytics Cloud Cybersecurity Platform

By   /  February 14, 2017  /  No Comments

by Angela Guess

A recent press release states, “Eastwind Networks, the cybersecurity solutions and breach analytics cloud platform designed to provide visibility, forensics and incident response capabilities to enterprises, today announced the release of its enhanced Enterprise Breach Analytics Cloud platform—available immediately for trial or purchase—with targeted capabilities to support both enterprise security and SOC teams. ‘Enterprise security teams have spoken and Eastwind has been listening,’ said Paul Kraus, CEO of Eastwind Networks. ‘Visibility of key cyber terrain is a core focus that has become increasingly complicated as businesses transform their IT organizations by moving to a mobile workforce, cloud infrastructure and/or other service providers. Eastwind’s technology enables businesses to grow and embrace new realities with an approach led by visibility and situational awareness to identify, prevent and respond to threats’.”

The release goes on, “Eastwind Breach Analytics Cloud provides complete visibility across the entire attack surface by collecting telemetry from hybrid environments, traditional and non-traditional networks, cloud software and infrastructure providers and off-premise users. Serving as the system of record, Eastwind Networks provides the critical context to make intelligent decisions quickly. New platform features include: Automated Threat Hunters: Uses on-demand machine learning to identify where an entity became an outlier and uses that model to retrospectively analyze an entire dataset to discover unknown threats. As threat intelligence is updated, automated threat hunters continuously search backwards and forwards to identify. Threat Intelligence: Integrates a growing list of industry leading cyber threat intelligence sources into a rules engine and enrichment process to leverage industry-specific or proprietary threat feeds.”

Read more at Business Wire.

Photo credit: Eastwind Networks

You might also like...

To Get Value from Data, Organizations Should Also Focus on Data Flow

Read More →