01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

sources (such as syslog’s, Net Flow data, authentication logs, and application logs) and trying to<br />

reconstruct what happened.<br />

Leading US healthcare organizations’ security teams are turning to continuous packet capture to<br />

give them an edge in dealing with the flood of alerts and helping them accelerate the investigation<br />

and response process. Recording what happens on their network lets SecOps teams go from a<br />

security alert in their monitoring tools directly to definitive, packet-level evidence. Real-life<br />

examples include:<br />

A hospital group in the Northeastern US is preventing malware attacks by extracting and<br />

reconstructing executable email attachments from recorded traffic and running them in a sandbox<br />

to validate whether they are malware or not. It also uses recorded network history to successfully<br />

thwart phishing attacks and identify potentially compromised credentials before attackers have an<br />

opportunity to use them to access systems. It can also identify when hospital staff have had their<br />

personal credentials compromised while on the hospital’s network (e.g. banking logins<br />

compromised through phishing) and as a result can warn them to change their passwords<br />

immediately.<br />

A large healthcare organization based in the Southern US uses recorded network history to<br />

accelerate the investigation of security alerts raised by their security monitoring software tools,<br />

such as Darktrace, and collected by their Spelunk SIEM. The security team can swiftly retrieve<br />

the packets relating to an alert to see precisely what has occurred, and immediately go into<br />

analysis mode to know how to respond and what the scope of the threat is.<br />

Virtualizing and streamlining security functions on a common platform can enable organizations<br />

to continually evolve their defenses and keep ahead of security threats. With access to a packetlevel<br />

history of network activity, analysts can examine the actual packets relating to a security<br />

alert to make sure they have the definitive evidence they need to quickly and conclusively<br />

investigate and respond to security threats and reduce the backlog of unexamined alerts.<br />

About the Author<br />

John Attala is the Director, North America for Endace, a world leader in<br />

high-speed network monitoring and recording technology. As the North<br />

American sales leader, John has played a pivotal role in launching and<br />

building Endace’s network monitoring business within the North<br />

America. He has more than 20 years’ experience in selling networking<br />

and security solutions to Fortune 1000 companies and government<br />

accounts—bringing a deep understanding of the market, delivering a<br />

consultative, solution selling approach to solve complex problems and<br />

improving network security across the globe. John can be<br />

Reached at Twitter (https://twitter.com/endace) and LinkedIn<br />

(https://www.linkedin.com/in/john-attala-8408a9a/)<br />

and at our company website (http://www.endace.com ) and<br />

LinkedIn (https://www.linkedin.com/company/endace/).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!