Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Network Traffic Analysis (NTA)<br />
By Timothy Liu, CTO & Co-Founder, Hillstone Networks<br />
Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of<br />
security solutions that use network communications as the foundational data source for detecting and<br />
investigating security threats and anomalous or malicious behaviors within that network.<br />
NTA was named one of the top 11 emerging technologies in 2017 by Gartner. As the technology is<br />
maturing, security vendors are delivering a variety of solutions that directly utilize NTA or integrate NTA<br />
as part of an overall threat protection solution platform.<br />
On February 28 <strong>2019</strong>, Gartner published its first market guide for NTA. In this report, it has provided an<br />
overview of the NTA technology landscape, has set the market direction and analyzed corresponding<br />
products from leading vendors. This is the first and most critical guide on the NTA market since the<br />
category was first created a few years ago.<br />
Here, we will first go over the key functionalities and elements of NTA technology. In the second part, we<br />
will discuss some major functionalities of the NTA platform from Hillstone Networks.<br />
What is NTA?<br />
NTA technology itself has been around for a while. It has been widely used in network monitoring and<br />
traffic analysis; it can help provide comprehensive visibility of the entire network to gain insights into<br />
network operations and performance, among other things.<br />
As it turns out, today, cyber criminals, casual or professional hackers and other sponsored organizations<br />
are using more and more advanced techniques and tools to stage cyberattacks; these are more targeted,<br />
persistent and sophisticated attacks and their goals often involve stealing useful user credentials, critical<br />
63