Security On-Demand is dedicated to advancing our patented tools and technologies to keep our customers’ data safe. This major service update gives customers a window into their data that they have never had before, while still receiving the superior level of threat detection and monitoring services they have come to expect.
A Next Generation Cyber-Threat Detection Platform
The new enhancements to the service will give customers the ability to visualize user and asset activity in their environment, provide advanced integration opportunities, and increase the effectiveness of our analysts to find threats faster.
New & Enhanced Features include:
User Behavioral Analytics gives customers the ability to see an illustrated visual of all activity of a user and their associated assets in the environment over a specific time period.
Asset Behavioral Analytics gives ThreatWatch customers a visual window into activity around specific assets and their associated users in their environment.
This release also includes new technology utilizing an artificial intelligence threat detection bot that leverages a backward propagating neural network, making SOC analysts more efficient at identifying and investigating high confidence alerts. It creates higher visibility in the SOC alerting platform for specific alerts based on this intelligence helping to further filter the noise out of a customer’s environment.
Devices with simple functions, basic designs, and unchanged default passwords – typical for an IOT device – are often targeted by hackers looking to gain a foothold in a network. The ThreatWatch platform now allows users to monitor and alert on IOT devices in order to protect the networks they connect to from malicious activity.
ThreatWatch has enhanced its ability to monitor Network Flow data to identify potential insider threat activity, including the correlation of anomalies of over 40 risk-based behaviors.
ThreatWatch now offers O365/Azure AD Integration, delivering visibility into those cloud networks, and more specifically who is accessing those networks.
Quickly sift through logs or localized alerts at a summary level to investigate specific issues regarding threats to your network.