why profile?

1
Why Profile? FlowTraq’s NBI toolkit is your network security guard, defending against data theft and data leakage. The security guard or the receptionist at your building entrance know the people who work there and their usual habits. They know delivery schedules and the usual drivers. They know which doors are usually kept closed. And they know all this even though these things change over time. There’s a difference between what’s usual and what’s unexpected. They know when things deviate from the usual, and this knowledge has saved employers from theft, arson, and other loss on countless occasions. Your network demands the same level of protection, and the same kind of knowledge. Computers and mobile devices have very predictable patterns of behavior which change over time. For instance, Web servers serve web content, and printers are used mostly when there are people physically present in the office. Email servers and email clients see predictable volumes at specific times of the day. Protecting a computer network from data theft and data leakage requires knowledge of the usual and expected so you can spot the unusual and unexpected. FlowTraq’s NBI toolkit is your network security guard. It uses powerfulNetwork Behavioral Intelligence technology to learn what is usual and expected in large volumes of traffic. With the Q1/13 release of FlowTraq, a new ‘Threats’ page is available in our Web interface that allows you to quickly manage your NBI security guards; point them at your most sensitive assets, and ensure they keep a watchful eye for any unusual and undesired activity. It’s easy, and it’s powerful. Within seconds FlowTraq will be picking up on seemingly innocuous network traffic that deviates from the norm, pointing out DDoS attacks, SYN floods, botnet control connections, and undesired data exfiltrations. Threats are managed through an innovative ‘Anomaly Index’ that shows you at a glance just how unusual the behavior is, and how confident the detector is about that anomaly. This allows you to quickly prioritize alerts and focus your time where it is most needed.

Upload: proqsys

Post on 28-Mar-2016

214 views

Category:

Documents


0 download

DESCRIPTION

FlowTraq’s NBI toolkit is your network security guard, defending against data theft and data leakage.

TRANSCRIPT

Page 1: Why Profile?

Why Profile? FlowTraq’s NBI toolkit is your network security guard, defending against data theft and data leakage.

The security guard or the receptionist at your building entrance know the people who work there and their usual

habits. They know delivery schedules and the usual drivers. They know which doors are usually kept closed.

And they know all this even though these things change over time. There’s a difference between what’s usual

and what’s unexpected. They know when things deviate from the usual, and this knowledge has saved

employers from theft, arson, and other loss on countless occasions.

Your network demands the same level of protection, and the same kind

of knowledge. Computers and mobile devices have very predictable patterns of behavior which change over time.

For instance, Web servers serve web content, and printers are used mostly when there are people physically

present in the office. Email servers and email clients see predictable volumes at specific times of the day.

Protecting a computer network from data theft and data leakage requires knowledge of the usual and expected

so you can spot the unusual and unexpected.

FlowTraq’s NBI toolkit is your network security guard. It uses powerfulNetwork Behavioral Intelligence

technology to learn what is usual and expected in large volumes of traffic. With the Q1/13 release of FlowTraq, a

new ‘Threats’ page is available in our Web interface that allows you to quickly manage your NBI security guards;

point them at your most sensitive assets, and ensure they keep a watchful eye for any unusual and undesired

activity. It’s easy, and it’s powerful.

Within seconds FlowTraq will be picking up on seemingly innocuous network traffic that deviates from the norm,

pointing out DDoS attacks, SYN floods, botnet control connections, and undesired data exfiltrations. Threats are

managed through an innovative ‘Anomaly Index’ that shows you at a glance just how unusual the behavior is,

and how confident the detector is about that anomaly. This allows you to quickly prioritize alerts and focus your

time where it is most needed.