02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Network Traffic Analysis (NTA)<br />

By Timothy Liu, CTO & Co-Founder, Hillstone Networks<br />

Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of<br />

security solutions that use network communications as the foundational data source for detecting and<br />

investigating security threats and anomalous or malicious behaviors within that network.<br />

NTA was named one of the top 11 emerging technologies in 2017 by Gartner. As the technology is<br />

maturing, security vendors are delivering a variety of solutions that directly utilize NTA or integrate NTA<br />

as part of an overall threat protection solution platform.<br />

On February 28 <strong>2019</strong>, Gartner published its first market guide for NTA. In this report, it has provided an<br />

overview of the NTA technology landscape, has set the market direction and analyzed corresponding<br />

products from leading vendors. This is the first and most critical guide on the NTA market since the<br />

category was first created a few years ago.<br />

Here, we will first go over the key functionalities and elements of NTA technology. In the second part, we<br />

will discuss some major functionalities of the NTA platform from Hillstone Networks.<br />

What is NTA?<br />

NTA technology itself has been around for a while. It has been widely used in network monitoring and<br />

traffic analysis; it can help provide comprehensive visibility of the entire network to gain insights into<br />

network operations and performance, among other things.<br />

As it turns out, today, cyber criminals, casual or professional hackers and other sponsored organizations<br />

are using more and more advanced techniques and tools to stage cyberattacks; these are more targeted,<br />

persistent and sophisticated attacks and their goals often involve stealing useful user credentials, critical<br />

63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!