<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Predictive Analytics Archives &#8211; CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</title>
	<atom:link href="https://cysight.ai/category/predictive-analytics/feed/" rel="self" type="application/rss+xml" />
	<link>https://cysight.ai/category/predictive-analytics/</link>
	<description>AI-Driven Cybersecurity for NetFlow, IPFIX and sFlow, with Encrypted Traffic Analysis, Baselining and Security Observability</description>
	<lastBuildDate>Thu, 18 Dec 2025 00:56:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Advanced Predictive AI leveraging Granular Flow-Based Network Analytics.</title>
		<link>https://cysight.ai/cysights-understanding-the-essentials/</link>
					<comments>https://cysight.ai/cysights-understanding-the-essentials/#respond</comments>
		
		<dc:creator><![CDATA[Tomare Curran]]></dc:creator>
		<pubDate>Mon, 13 Oct 2025 12:27:08 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/?p=14637</guid>

					<description><![CDATA[<p>IT’S WHAT YOU DON’T SEE THAT POSES THE BIGGEST THREATS AND INVISIBLE DANGERS. Existing network management and network security point solutions are facing a major challenge due to the increasing complexity of the IT infrastructure. The main issue is a lack of visibility into all aspects of physical network and cloud network usage, as well...</p>
<p>The post <a href="https://cysight.ai/cysights-understanding-the-essentials/">Advanced Predictive AI leveraging Granular Flow-Based Network Analytics.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="14637" class="elementor elementor-14637" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-4b044c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4b044c5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26d9c4b" data-id="26d9c4b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-82d666d elementor-widget elementor-widget-heading" data-id="82d666d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">IT’S WHAT YOU DON’T SEE THAT POSES THE BIGGEST THREATS AND INVISIBLE DANGERS.</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-508fb13 elementor-widget elementor-widget-text-editor" data-id="508fb13" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Existing network management and network security point solutions are facing a major challenge due to the increasing complexity of the IT infrastructure.</p>
<p>The main issue is a lack of visibility into all aspects of physical network and cloud network usage, as well as increasing compliance, service level management, regulatory mandates, a rising level of sophistication in cybercrime, and increasing server virtualization.</p>
<p>With appropriate visibility and context, a variety of network issues can be resolved and handled by understanding the causes of network slowdowns and outages, detecting cyber-attacks and risky traffic, determining the origin and nature, and assessing the impact.</p>
<p>It’s clear that in today’s work-at-home, cyberwar, ransomware world, having adequate network visibility in an organization is critical, but defining how much visibility is considered “right” visibility is becoming more difficult, and more often than not even well-seasoned professionals make incorrect assumptions about the visibility they think they have. These misperceptions and malformed assumptions are much more common than you would expect and you would be forgiven for thinking you have everything under control.</p>
<p>When it comes to resolving IT incidents and security risks and assessing the business impact, every minute counts. The primary goal of Predictive AI Baselining coupled with deep contextual Network Forensics is to improve the visibility of Network Traffic by removing network blindspots and identifying the sources and causes of high-impact traffic.</p>
<p>Inadequate solutions (even the most well-known) mislead you into a false level of comfort but as they tend to only retain the top 2% or 5% of network communications frequently cause false positives and red herrings. Cyber threats can come from a variety of sources. These could be the result of new types of crawlers or botnets, infiltration and ultimately exfiltration that can destroy a business.</p>
<p>Networks are becoming more complex. Because of negligence, failing to update and patch security holes, many inadvertent threats can open the door to malicious outsiders. Your network could be used to download or host illegal materials, or it could be used entirely or partially to launch an attack. Ransomware attacks are still on the rise, and new ways to infiltrate organizations are being discovered. Denial of Service (DoS) and distributed denial of service (DDoS) attacks continue unabated, posing a significant risk to your organization. Insider threats can also occur as a result of internal hacking or a breach of trust, and your intellectual property may be slowly leaked as a result of negligence, hacking, or being compromised by disgruntled employees.</p>
<p>Whether you are buying a phone a laptop or a cyber security visibility solution the same rule applies and that is that marketers are out to get your hard-earned cash by flooding you with specifications and solutions whose abilities are radically overstated. Machine Learning  (ML) and Artificial Intelligence (AI) are two of the most recent to join the acronyms. The only thing you can know for sure dear cyber and network professional reader is that they hold a lot of promise.</p>
<p>One thing I can tell you from many years of experience in building flow analytics, threat intelligence, and cyber security detection solutions is that without adequate data your results become skewed and misleading. Machine Learning and AI enable high-speed detection and mitigation but without Granular Analytics (aka Big Data) you won&#8217;t know what you don&#8217;t know and neither will your AI!</p>
<p>In our current Covid world we have all come to appreciate, in some way, the importance of big data, ML and AI that if properly applied, just how quickly it can help mitigate a global health crisis. We only have to look back a few years when drug companies didn&#8217;t have access to granular data the severe impact that poor data had on people&#8217;s lives. Thalidomide is one example. In the same way, when cyber and network visibility solutions are only surface scraping data information will be incorrect and misleading and could seriously impact your network and the livelihoods of the people you work for and together with.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-c173938 elementor-widget elementor-widget-heading" data-id="c173938" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">The Red Pill or The Blue Pill?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-6b9938d elementor-widget elementor-widget-text-editor" data-id="6b9938d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The concept of flow or packet-based analytics is straightforward, yet they have the potential to be the most powerful tools for detecting ransomware and other network and cloud-related concerns. All communications leave a trail in the flow data, and with the correct tools, you can recover all evidence of an assault, penetration, or exfiltration.</p>
<p>Not all analytic systems are made equal, and the flow/packet ideals become unattainable for other tools because of their difficulty to scale in retention. Even well-known tools have serious flaws and are limited in their ability to retain complete records, which is often overlooked. They don&#8217;t effectively provide the visibility of the blindspots they claimed.</p>
<p>As already pointed out, over 95% of network and deep packet inspection (DPI) solutions struggle to retain even 2% to 5% of all data captured in medium to large networks, resulting in completely missing diagnoses and delivering significantly misleading analytics that leads to misdiagnosis and risk!</p>
<p>It is critical to have the context and visibility necessary to assess all relevant traffic to discover concurrent intellectual property exfiltration and to quantify and mitigate the risk. It&#8217;s essential to determine whether a newly found Trojan or Ransomware has been active in the past and when it entered and what systems are still at risk.</p>
<p>Threat hunting demands multi-focal analysis at a granular level that sampling, and surface flow analytics methods just cannot provide. It is ineffective to be alerted to a potential threat without the context and consequence. The Hacker who has gained control of your system is likely to install many backdoors on various interconnected systems to re-enter when you are unaware. As Ransomware progresses it will continue to exploit weaknesses in Infrastructures.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f215e6c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f215e6c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-268272f" data-id="268272f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8fa0ec2 elementor-widget elementor-widget-text-editor" data-id="8fa0ec2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<h1 style="font-size: 1.7em; text-align: center; color: #3366ff;"><strong>Often those most vulnerable are those who believe they have the visibility to detect.</strong></h1>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ba8998d" data-id="ba8998d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-139ace4 elementor-widget elementor-widget-image" data-id="139ace4" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="512" height="580" src="https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-512x580.png" class="attachment-react-512 size-react-512 wp-image-14639" alt="Network Matrix of Knowledge" srcset="https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-512x580.png 512w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-265x300.png 265w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-21x24.png 21w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-32x36.png 32w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-42x48.png 42w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-768x869.png 768w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-904x1024.png 904w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-1357x1536.png 1357w, https://cysight.ai/wp-content/uploads/Network-Matrix-of-Knowledge-e1744643948875-1809x2048.png 1809w" sizes="(max-width: 512px) 100vw, 512px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-bbb0d9a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bbb0d9a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5e2475" data-id="e5e2475" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d221381 elementor-widget elementor-widget-text-editor" data-id="d221381" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Post-mortem analysis of incidents is required, as is the ability to analyze historical behaviors, investigate intrusion scenarios and potential data breaches, qualify internal threats from employee misuse, and quantify external threats from bad actors.</p>
<p>The ability to perform network forensics at a granular level enables an organization to discover issues and high-risk communications happening in real-time, or those that occur over a prolonged period such as data leaks. While standard security devices such as firewalls, intrusion detection systems, packet brokers or packet recorders may already be in place, they lack the ability to record and report on every network traffic transfer over the long term.</p>
<p>According to industry analysts, enterprise IT security necessitates a shift away from prevention-centric security strategies and toward information and end-user-centric security strategies focused on an infrastructure&#8217;s endpoints, as advanced targeted attacks are poised to render prevention-centric security strategies obsolete and today with <a href="https://cysight.ai/cysight_ransomware_detection/" target="_blank" rel="noopener"><span style="color: #3366ff;">Cyberwar</span></a> a reality that will impact business and government alike.</p>
<p>As every incident response action in today&#8217;s connected world includes a communications component, using an integrated cyber and network intelligence approach provides a superior and cost-effective way to significantly reduce the Mean Time To Know (MTTK) for a wide range of network issues or risky traffic, reducing wasted effort and associated direct and indirect costs.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-36e0614 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="36e0614" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8cb120" data-id="a8cb120" data-element_type="column" data-e-type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1dcd209 elementor-widget elementor-widget-heading" data-id="1dcd209" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Understanding The shift towards Flow-Based Metadata<br><br>for Network and Cloud Cyber-Intelligence</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-5ab4498 elementor-widget elementor-widget-text-editor" data-id="5ab4498" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul><li><span style="color: #000000;">The IT infrastructure is continually growing in complexity.</span></li>
<li><span style="color: #000000;">Deploying packet capture across an organization is costly and prohibitive especially when distributed or per segment.</span></li>
<li><span style="color: #000000;">“Blocking &amp; tackling” (Prevention) has become the least effective measure.</span></li>
<li><span style="color: #000000;">Advanced targeted attacks are rendering prevention‑centric security strategies obsolete.</span></li>
<li><span style="color: #000000;">There is a Trend towards information and end‑user centric security strategies focused on an infrastructure’s end‑points.</span></li>
<li><span style="color: #000000;">Without making use of collective sharing of threat and attacker intelligence you will not be able to defend your business.</span></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-97e52e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="97e52e5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69af4e4" data-id="69af4e4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap">
							</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-332fd10 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="332fd10" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-146f0ec" data-id="146f0ec" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f9b91b1 elementor-widget elementor-widget-heading" data-id="f9b91b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">So what now?</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-c5ba247 elementor-widget elementor-widget-text-editor" data-id="c5ba247" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>If prevention isn&#8217;t working, what can IT still do about it?</b></p><ul><li>In most cases, information must become the focal point for our information security strategies. IT can no longer control invasive controls on user&#8217;s devices or the services they utilize.</li></ul><p><b>Is there a way for organizations to gain a clear picture of what transpired after a security breach?</b></p><ul><li>Detailed monitoring and recording of interactions with content and systems. Predictive AI Baselining, Granular Forensics, Anomaly Detection and Threat Intelligence ability is needed to quickly identify what other users were targeted, what systems were potentially compromised and what information was exfiltrated.</li></ul><p><b>How do you identify attacks without signature-based mechanisms?</b></p><ul><li>Pervasive monitoring enables you to identify meaningful deviations from normal behavior to infer malicious intent. Nefarious traffic can be identified by correlating real-time threat feeds with current flows. Machine learning can be used to discover outliers and repeat offenders.</li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-73f6081 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="73f6081" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8df64f1" data-id="8df64f1" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-116c837 elementor-widget elementor-widget-heading" data-id="116c837" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Summing up</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-134abd5 elementor-widget elementor-widget-text-editor" data-id="134abd5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Network security and network monitoring have gone a long way and jumped through all kinds of hoops to reach the point they have today. Unfortunately, through the years, cyber marketing has surpassed cyber solutions and we now have misconceptions that can do considerable damage to an organization.</p><p><strong>The biggest threat is always the one you cannot see</strong> and hits you the hardest once it has established itself slowly and comfortably in a network undetected. Complete visibility can only be accessed through 100% collection and retention of all data traversing a network, otherwise even a single blindspot will affect the entire organization as if it were never protected to begin with. Just like a single weak link in a chain, cyber criminals will find the perfect access point for penetration.</p><p>Inadequate solutions that only retain the top 2% or 5% of network communications frequently cause false positives and red herrings. You need to have 100% access to your comms data for Full Visibility, but how can you be sure that you will?</p><p>You need free access to Full Visibility to unlock all your data and an Intelligent Predictive AI technology that can autonomously and quickly identify what&#8217;s not normal at both the macro and micro level of your network, cloud, servers, iot devices and other network connected assets. <u></u></p><p><u><a href="https://cysight.ai/go/free-trial/" target="_blank" rel="noopener"><span style="color: #3366ff;">Get complete visibility wiith CySight now &#8211;>>></span></a></u></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/cysights-understanding-the-essentials/">Advanced Predictive AI leveraging Granular Flow-Based Network Analytics.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cysight.ai/cysights-understanding-the-essentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hunt SUNBURST and Trojans with Turbocharged Netflow.</title>
		<link>https://cysight.ai/cysight_solves_sunburst/</link>
					<comments>https://cysight.ai/cysight_solves_sunburst/#respond</comments>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 12:06:31 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/?p=13390</guid>

					<description><![CDATA[<p>US: December 13 of 2020 was an eye-opener worldwide as Solarwinds software Orion, was hacked using a trojanized update known as SUNBURST backdoor vulnerability. The damage reached thousands of customers, many of which are world leaders in their markets like Intel, Microsoft, Lockheed, Visa, and several USA  governmental agencies. The extent of the damage has...</p>
<p>The post <a href="https://cysight.ai/cysight_solves_sunburst/">Hunt SUNBURST and Trojans with Turbocharged Netflow.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13390" class="elementor elementor-13390" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-0cde79c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0cde79c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c3c47e" data-id="1c3c47e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f1ac5c3 elementor-widget elementor-widget-text-editor" data-id="f1ac5c3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>US: December 13 of 2020 was an eye-opener worldwide as Solarwinds software Orion, was hacked using a trojanized update known as SUNBURST backdoor vulnerability. The damage reached <span style="color: #3366ff;"><a style="color: #3366ff;" href="https://www.businessinsider.com/list-of-companies-agencies-at-risk-after-solarwinds-hack-2020-12?op=1" target="_blank" rel="noopener">thousands of customers</a></span>, many of which are world leaders in their markets like Intel, Microsoft, Lockheed, Visa, and several USA  governmental agencies. The extent of the damage has not been fully quantified as still more is being learned, nevertheless, the fallout includes real-world harm.</p><p>The recent news of the SolarWinds Orion hack is very unfortunate. The hack has left governments and customers who used the SolarWinds Orion tools especially vulnerable and the fallout will still take many months to be recognized. This is a prime example of an issue where a flow metadata tool has the inability to retain sufficient records, causing ineffective intelligence, and that the inability to reveal hidden issues and threats is now clearly impacting organizations&#8217; and government networks and connected assets.</p><p>Given what we already know and that more is still being learned, <a href="https://cysight.ai/go/free-trial" rel="noopener">it makes good sense to investigate an alternative solution</a>.</p><div id="s3gt_translate_tooltip_mini" class="s3gt_translate_tooltip_mini_box" style="background: initial !important; border: initial !important; border-radius: initial !important; border-spacing: initial !important; border-collapse: initial !important; direction: ltr !important; flex-direction: initial !important; font-weight: initial !important; height: initial !important; letter-spacing: initial !important; min-width: initial !important; max-width: initial !important; min-height: initial !important; max-height: initial !important; margin: auto !important; outline: initial !important; padding: initial !important; position: absolute; table-layout: initial !important; text-align: initial !important; text-shadow: initial !important; width: initial !important; word-break: initial !important; word-spacing: initial !important; overflow-wrap: initial !important; box-sizing: initial !important; display: initial !important; color: inherit !important; font-size: 13px !important; font-family: X-LocaleSpecific, sans-serif, Tahoma, Helvetica !important; line-height: 13px !important; vertical-align: top !important; white-space: inherit !important; left: 236px; top: 170px; opacity: 0.65;"><div id="s3gt_translate_tooltip_mini_logo" class="s3gt_translate_tooltip_mini" title="Translate selected text"> </div><div id="s3gt_translate_tooltip_mini_sound" class="s3gt_translate_tooltip_mini" title="Play"> </div><div id="s3gt_translate_tooltip_mini_copy" class="s3gt_translate_tooltip_mini" title="Copy text to Clipboard"> </div></div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e1c88e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e1c88e5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1491ccb" data-id="1491ccb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e16cc43 elementor-widget elementor-widget-heading" data-id="e16cc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What Is the SUNBURST Trojan Attack?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8f575b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8f575b5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b72778" data-id="5b72778" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8351ec4 elementor-widget elementor-widget-text-editor" data-id="8351ec4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>SUNBURST, as named by <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" target="_blank" rel="noopener">FireEye</a>, is a kind of malware that acts as a trojan horse designed to look like a safe and trustworthy update for Solarwinds customers. To accomplish such infiltration to seemingly well-protected organizations, the hackers had to first infiltrate the Solarwinds infrastructure. Once Solarwinds was successfully hacked, the bad actors could now rely on the trust between Solarwinds and the targeted organizations to carry out the attack. The malware, which looked like a routine update, was in fact creating a back door, compromising the Solarwinds Orion software and any customer who updates their system.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-61690bf elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="61690bf" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6d835e" data-id="b6d835e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-55f83ba elementor-widget elementor-widget-heading" data-id="55f83ba" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How was SUNBURST detected?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b266d84 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b266d84" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-343951f" data-id="343951f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9fe7741 elementor-widget elementor-widget-text-editor" data-id="9fe7741" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Initially, SUNBURST malware was completely undetected for some time. The attackers started to install a remote access tool malware into the Solarwinds Orion software all the way back in March of 2020, essentially trojaning them. On December 8, 2020, FireEye discovered their own red team tools have been stolen and started to investigate while reporting the event to the NSA. The NSA, also a Solarwinds software user, who is responsible for the USA cybersecurity defense, was unaware of the hack at the time. A few days later, as soon as the information became more public, different cybersecurity firms began to work on reverse engineering and analyzing the hack.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7034389 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7034389" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e68c4eb" data-id="e68c4eb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a844395 elementor-widget elementor-widget-heading" data-id="a844395" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">IT’S WHAT WE DON’T SEE THAT POSES THE BIGGEST THREATS AND INVISIBLE DANGERS!</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9d0b658 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9d0b658" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4904e5c" data-id="4904e5c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6e8136c elementor-widget elementor-widget-text-editor" data-id="6e8136c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>You may be surprised to learn that most well-known tools lack the REAL Visibility that could have prevented attacks on a network and its local and cloud-connected assets. There are some serious shortcomings in the base designs of other flow solutions that result in their <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">inability to scale in retention.</a> This is why smart analysts are realizing that Threat Intelligence and Flow Analytics today is all about having access to long term granular intelligence.</p><p>From a forensics perspective, you would appreciate that you can only analyze the data you retain, and with large and growing network and cloud data flows most tools (regardless of their marketing claims) actually cannot scale in retention and choose to drop records in lieu of what they believe is salient data.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f8dac10 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f8dac10" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eeb11a8" data-id="eeb11a8" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b4a34bf elementor-widget elementor-widget-image" data-id="b4a34bf" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="854" height="438" src="https://cysight.ai/wp-content/uploads/CySight_retention--1024x525.png" class="attachment-large size-large wp-image-17237" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_retention--1024x525.png 1024w, https://cysight.ai/wp-content/uploads/CySight_retention--300x154.png 300w, https://cysight.ai/wp-content/uploads/CySight_retention--768x393.png 768w, https://cysight.ai/wp-content/uploads/CySight_retention--1536x787.png 1536w, https://cysight.ai/wp-content/uploads/CySight_retention--512x262.png 512w, https://cysight.ai/wp-content/uploads/CySight_retention--24x12.png 24w, https://cysight.ai/wp-content/uploads/CySight_retention--36x18.png 36w, https://cysight.ai/wp-content/uploads/CySight_retention--48x25.png 48w, https://cysight.ai/wp-content/uploads/CySight_retention-.png 1636w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5f77f73 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5f77f73" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ef762f" data-id="5ef762f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1de185d elementor-widget elementor-widget-text-editor" data-id="1de185d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Imputed outcome data leads to misleading results and missing data causes high risk and loss!​								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-6fc1704 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6fc1704" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66f54ad" data-id="66f54ad" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-192764a elementor-widget elementor-widget-text-editor" data-id="192764a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>A simple way to think about this is if you could imagine trying to collect water from a blasting fire hose into a drinking cup. You just simply cannot collect very much!</p><p>Many engineers build scripts to try to attain the missing visibility and do a lot of heavy lifting and then finally come to the realization that no matter how much lifting you do that if the data ain’t there you can’t analyze it.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-be7e094 elementor-widget elementor-widget-text-editor" data-id="be7e094" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									We found that over 95% of network and cyber visibility tools retain as little as 2% to 5% of all information collected resulting in completely missed analytics, severely misleading analytics, and risk! 								</div>
				</div>
				<div class="elementor-element elementor-element-40cf794 elementor-widget elementor-widget-image" data-id="40cf794" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="854" height="505" src="https://cysight.ai/wp-content/uploads/CySight_Compare-1-1024x606.png" class="attachment-large size-large wp-image-17256" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_Compare-1-1024x606.png 1024w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-300x178.png 300w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-768x455.png 768w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-1536x910.png 1536w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-2048x1213.png 2048w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-512x303.png 512w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-24x14.png 24w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-36x21.png 36w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-48x28.png 48w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5fa2b2a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5fa2b2a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-00dd51a" data-id="00dd51a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5f152f7 elementor-widget elementor-widget-heading" data-id="5f152f7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How does CySight hunt SUNBURST and other Malware?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-1f63079 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1f63079" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b097e0" data-id="4b097e0" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-824febc elementor-widget elementor-widget-text-editor" data-id="824febc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>It’s often necessary to try and look back with new knowledge that we become aware of to analyze.</p><p>For a recently discovered Ransomware or Trojan, such as SUNBURST, it is helpful to see if it’s been active in the past and when it started. Another example is being able to analyze all the related traffic and qualify how long a specific user or process has been exfiltrating an organization&#8217;s Intellectual Property and quantify the risk.</p><p>SUNBURST enabled the criminals to install a Remote Access Trojan (RAT). RATs, like most Malware, are introduced as part of legitimate-looking files. Once enabled they allow the hacker to view a screen or a terminal session enabling them to look for sensitive data like customer&#8217;s credit cards, intellectual property or sensitive company or government secrets.</p><p>Even though many antivirus products can identify many RAT signatures, the software and protocols used to view remotely and to exfiltrate files continues to evade many malware detection systems. We must therefore turn to traffic analytics and machine learning to identify traffic behaviors and data movements that are out of the ordinary.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-92fa955 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="92fa955" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45a7534" data-id="45a7534" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7bfdd2d elementor-widget elementor-widget-heading" data-id="7bfdd2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Anonymity by Obscurity</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-50e4725 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="50e4725" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bcd5ed" data-id="7bcd5ed" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-044773c elementor-widget elementor-widget-image" data-id="044773c" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="854" height="405" src="https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity.png" class="attachment-large size-large wp-image-13441" alt="Anonymity_by_obscurity" srcset="https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity.png 897w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-300x142.png 300w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-768x364.png 768w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-512x243.png 512w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-24x11.png 24w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-36x17.png 36w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-48x23.png 48w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-350x166.png 350w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-600x284.png 600w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-27d9b62 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="27d9b62" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31ead2d" data-id="31ead2d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0deb9bb elementor-widget elementor-widget-text-editor" data-id="0deb9bb" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>In order to evade detection, hackers try to hide in plain sight and use protocols that are not usually blocked like DNS, HTTP, and Port 443 to exfiltrate your data.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-097a83c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="097a83c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea24e59" data-id="ea24e59" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c3931cb elementor-widget elementor-widget-image" data-id="c3931cb" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="854" height="401" src="https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when.png" class="attachment-large size-large wp-image-13440" alt="Sharding_who_what_where_when" srcset="https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when.png 912w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-300x141.png 300w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-768x360.png 768w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-512x240.png 512w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-24x11.png 24w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-36x17.png 36w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-48x23.png 48w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-350x164.png 350w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-600x282.png 600w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-1dd55ad elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1dd55ad" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f8c427" data-id="6f8c427" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c55d15b elementor-widget elementor-widget-text-editor" data-id="c55d15b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Many methods are used to <a href="https://www.netflowauditor.com/index.php/2016/05/05/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1/">exfiltrate your data</a>. An often-used method is to use p2p technologies to break files into small pieces and slowly send the data unnoticed by other monitoring systems. Due to CySight&#8217;s small footprint Dropless Collection you can easily identify sharding and our anomaly detection will identify the outlier traffic and quickly bring it to your attention. When used in conjunction with a packet broker partner such as Keysight, Gigamon, nProbe or other supported packet metadata exporter, CySight provides the extreme application intelligence to help you with complete visibility to control the breach.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-15e030d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="15e030d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30c0ab5" data-id="30c0ab5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-89a27a2 elementor-widget elementor-widget-heading" data-id="89a27a2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Identifying exposure</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e3bc790 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e3bc790" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af6b485" data-id="af6b485" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-458bb00 elementor-widget elementor-widget-image" data-id="458bb00" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="854" height="376" src="https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home.png" class="attachment-large size-large wp-image-13439" alt="Onion_routing_Malware_phone_home" srcset="https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home.png 868w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-300x132.png 300w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-768x338.png 768w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-512x225.png 512w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-24x11.png 24w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-36x16.png 36w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-48x21.png 48w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-350x154.png 350w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-600x264.png 600w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b74977a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b74977a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a2dd7f" data-id="0a2dd7f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a177e77 elementor-widget elementor-widget-text-editor" data-id="a177e77" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>In todays connected world every incident has a communications component</b></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-a6a8358 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a6a8358" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db9ba2c" data-id="db9ba2c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f9fb427 elementor-widget elementor-widget-text-editor" data-id="f9fb427" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>You need to keep in mind that all Malware needs to &#8220;call home&#8221; and today this is going to be through <a href="https://www.netflowauditor.com/index.php/2016/05/17/identifying-tor-threats-without-de-anonymizing/">onion routed connections</a>, encrypted VPNs, or via zombies that have been seeded as botnets making it difficult if not impossible to identify the hacking teams involved which may be personally, commercially or politically motivated bad actors.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-d9edd82 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="d9edd82" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c094188" data-id="c094188" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d17ce74 elementor-widget elementor-widget-heading" data-id="d17ce74" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Multi-focal threat hunting</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-439bda3 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="439bda3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc40a7d" data-id="cc40a7d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8ef7ca0 elementor-widget elementor-widget-image" data-id="8ef7ca0" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="854" height="386" src="https://cysight.ai/wp-content/uploads/CySight_threat1-1024x463.png" class="attachment-large size-large wp-image-17240" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_threat1-1024x463.png 1024w, https://cysight.ai/wp-content/uploads/CySight_threat1-300x136.png 300w, https://cysight.ai/wp-content/uploads/CySight_threat1-768x347.png 768w, https://cysight.ai/wp-content/uploads/CySight_threat1-1536x694.png 1536w, https://cysight.ai/wp-content/uploads/CySight_threat1-2048x925.png 2048w, https://cysight.ai/wp-content/uploads/CySight_threat1-512x231.png 512w, https://cysight.ai/wp-content/uploads/CySight_threat1-24x11.png 24w, https://cysight.ai/wp-content/uploads/CySight_threat1-36x16.png 36w, https://cysight.ai/wp-content/uploads/CySight_threat1-48x22.png 48w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-95da8a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="95da8a1" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-265f7b7" data-id="265f7b7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-923852f elementor-widget elementor-widget-text-editor" data-id="923852f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Threat hunting for SUNBURST or other Malware requires <a href="https://www.netflowauditor.com/index.php/2015/12/22/balancing-granularity-against-network-security-forensics/">multi-focal analysis at a granular level</a> that simply cannot be attained by sampling methods. It does little good to be alerted to a possible threat without having the detail to understand context and impact. The Hacker who has control of your system will likely install multiple back-doors on various interrelated systems so they can return when you are off guard.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-fd95723 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="fd95723" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61f804f" data-id="61f804f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7df8bec elementor-widget elementor-widget-heading" data-id="7df8bec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">CySight Turbocharges Flow and Cloud analytics for SecOps and NetOps</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-a3da042 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a3da042" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ab883d" data-id="4ab883d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b08c809 elementor-widget elementor-widget-text-editor" data-id="b08c809" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>As with all CySight analytics and detection, you don&#8217;t have to do any heavy lifting. We do it all for you!</p><p>There is no need to create or maintain special groups with Sunburst or other Malware IP addresses or domains. Every CySight instance is built to keep itself aware of new threats that are automatically downloaded in a secure pipe from our Threat Intelligence qualification engine that collects, collates and categorizes threats from around the globe or from partner threat feeds.</p><p>CySight Identifies your systems conversing with Bad Actors and allows you to back track through historical data to see how long it&#8217;s been going on.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ffbf54b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ffbf54b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-026be28" data-id="026be28" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-a8b0579 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a8b0579" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6c42159" data-id="6c42159" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7b90ae9 elementor-widget elementor-widget-image" data-id="7b90ae9" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="341" height="132" src="https://cysight.ai/wp-content/uploads/Distributed_threat_collection.png" class="attachment-large size-large wp-image-13437" alt="Distributed_threat_collection" srcset="https://cysight.ai/wp-content/uploads/Distributed_threat_collection.png 341w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-300x116.png 300w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-24x9.png 24w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-36x14.png 36w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-48x19.png 48w" sizes="(max-width: 341px) 100vw, 341px" />															</div>
				</div>
				<div class="elementor-element elementor-element-2b3b10c elementor-widget elementor-widget-text-editor" data-id="2b3b10c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>Using Big Data threat feeds collated from multiple sources, thousands of IPs of bad reputation are correlated in real-time with your traffic against threat data that is freshly derived from many enterprises and sources to provide effective visibility of threats and attackers.</b></p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-899ebe5" data-id="899ebe5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-df1952a elementor-widget elementor-widget-text-editor" data-id="df1952a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul><li><h3>Cyber feedback</h3></li><li><h3>Global honeypots</h3></li><li><h3>Threat feeds</h3></li><li><h3>Crowd sources</h3></li><li><h3>Active crawlers</h3></li><li><h3>External 3rd Party</h3></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-694d9a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="694d9a0" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34ca076" data-id="34ca076" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d3b85e2 elementor-widget elementor-widget-heading" data-id="d3b85e2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">So how exactly do you go about turbocharging your Flow and Cloud metadata?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-57af704 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="57af704" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9c23c55" data-id="9c23c55" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-64281ff elementor-widget elementor-widget-text-editor" data-id="64281ff" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>CySight software is capable of the highest level of granularity, scalability, and flexibility available in the network and cloud flow metadata market. Lack of granular visibility is one of, if not the main flaw in such products today as they retain as little as 2% to 5% of all information collected, due to inefficient design, severely impacting visibility and risk as a result of missing and misleading analytics, costing organizations greatly.</p><p>CySight’s Intelligent Visibility, Dropless Collection, automation, and machine intelligence reduce the heavy lifting in alerting, auditing, and discovering your network making performance analytics, anomaly detection, threat intelligence, forensics, compliance, zero trust and IP accounting and mitigation a breeze!</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/cysight_solves_sunburst/">Hunt SUNBURST and Trojans with Turbocharged Netflow.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cysight.ai/cysight_solves_sunburst/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Ways Flow Based Network Monitoring Solutions Need to Scale</title>
		<link>https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 19 Sep 2024 10:10:22 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/5-ways-flow-based-network-monitoring-solutions-need-to-scale-2/</guid>

					<description><![CDATA[<p>Partial Truth Only Results in Assumptions A common gripe for Network Engineers is that their current network monitoring solution doesn’t provide the depth of information needed to quickly ascertain the true cause of a network issue. Imagine reading a book that is missing 4 out of every 6 words, understanding the context will be hopeless...</p>
<p>The post <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">5 Ways Flow Based Network Monitoring Solutions Need to Scale</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="14464" class="elementor elementor-14464" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-12d97b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="12d97b5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c8f7556" data-id="5c8f7556" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5ea6fe34 elementor-widget elementor-widget-text-editor" data-id="5ea6fe34" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div>
<h2><span style="color: #000000;"><strong>Partial Truth Only Results in Assumptions</strong></span></h2>
<p><span style="color: #000000;">A common gripe for Network Engineers is that their current network monitoring solution doesn’t provide the depth of information needed to quickly ascertain the true cause of a network issue. Imagine reading a book that is missing 4 out of every 6 words, understanding the context will be hopeless and the book has near to no value. </span><span style="color: #000000;">Many already have over-complicated their monitoring systems and methodologies by continuously extending their capabilities with a plethora of add-ons or relying on disparate systems that often don’t interface very well with each other. </span><span style="color: #000000;">There is also an often-mistaken belief that the network monitoring solutions that they have invested in will suddenly give them the depth they need to have the required visibility to manage complex networks.</span></p>
<p><span style="color: #000000;">A best-value approach to NDR, NTA and general network monitoring is to use a flow-based analytics methodology such as NetFlow, sFlow or IPFIX.</span></p>
<p></p>
<h2><span style="color: #000000;"><strong>The Misconception &amp; What Really Matters</strong></span></h2>
<p><span style="color: #000000;">In this market, it’s common for the industry to express a flow software’s scaling capability in flows-per-second. </span><span style="color: #000000;">Using Flows-per-second as a guide to scalability is misleading as it is often used to hide a flow collector’s inability to archive flow data by overstating its collection capability and enables them to present a larger number considering they use seconds instead of minutes. </span><span style="color: #000000;">It’s important to look not only at flows-per-second but to understand the picture created once all the elements are used together. Much like a painting of a detailed landscape, the finer the brush and the more colors used will ultimately provide the complete and truly detailed picture of what was being looked at when drawing the landscape.</span></p>
<p><span style="color: #000000;">Granularity is the prime factor to start focusing on, specifically referring to granularity retained per minute (flow retention rate). Naturally, speed impediment is a significant and critical factor to be aware of as well. The speed and flexibility of alerting, reporting, forensic depth, and diagnostics all play a strategic role but will be hampered when confronted with scalability limitations. Observing the behavior when impacted by high-flow-variance or sudden-bursts and considering the number of devices and interfaces can enable you to appreciate the absolute significance of scalability in producing actionable insights and analytics.&nbsp; Not to mention the ability to retain short-term and historical collections, which provide vital trackback information, would be nonexistent. To provide the necessary visibility to accomplish the ever-growing number of tasks analysts and engineers must deal with daily along with resolving issues to completion, </span><span style="color: #000000;">NDR, NTA and general </span><span style="color: #000000;">Network Monitoring System (NMS) must have the ability to scale in all its levels of consumption and retention.</span></p>
<p></p>
<h2><span style="color: #000000;"><strong>How Should Monitoring Solutions Scale?</strong></span></h2>
<p><span style="color: #000000;">Flow-Based Network Detection and Response (NDR) / Network Traffic Analysis (NTA) software needs to scale in its collection of data in five ways:</span></p>
<p><span style="color: #000000;"><strong>Ingestion Capability</strong> – Also referred to as <strong>Collection,</strong> means the number of flows that can be consumed by a single collector. This is a feat that most monitoring solutions are able to accomplish, unfortunately, it is also the one they pride themselves on. It is an important ability but is only the first step of several crucial capabilities that will determine the quality of insights and intelligence of a monitoring system. Ingestion is only the ability to take in data, it does not mean “retention”, and therefore could do very little on its own.</span></p>
<p><span style="color: #000000;"><strong>Digestion Capability</strong> – Also referred to as <strong>Retention,</strong> means the number of flow records that can be retained by a single collector. The most overlooked and difficult step in the network monitoring world. Digestion / Flow retention rates are particularly critical to quantify as they dictate the level of granularity that allows a flow-based NMS to deliver the visibility required to achieve quality Predictive AI Baselining, Anomaly Detection, Network Forensics, Root Cause Analysis, Billing Substantiation, Peering Analysis, and Data Retention compliance. Without retaining data, you cannot inspect it beyond the surface level, losing the value of network or cloud visibility.</span></p>
<p><span style="color: #000000;"><strong>Multitasking Processes</strong>&#8211; Pertains to the multitasking strength of a solution and its ability to scale and spread a load of collection processes across multiple CPUs on a single server.&nbsp; This seems like an obvious approach to the collection but many systems have taken a linear serial approach to handle and ingest multiple streams of flow data that don&#8217;t allow their technologies to scale when new flow generating devices, interfaces, or endpoints are added forcing you to deploy multiple instances of a solution which becomes ineffective and expensive.<br></span></p>
<p><span style="color: #000000;"><strong>Clustered Collection</strong> &#8211; Refers to the ability of a flow-based solution to run a single data warehouse that takes its input from a cluster of collectors as a single unit as a means to load balance. In a large environment, you mostly have very large equipment that sends massive amounts of data to collectors. In order to handle all that data, you must distribute the load amongst a number of collectors in a cluster to multiple machines that make sense of it instead of a single machine that will be overloaded. This ability enables organizations to scale up in data use instead of dropping it as they attempt to collect it.</span></p>
<p><span style="color: #000000;"><strong>Hierarchical Correlation</strong> – The purpose of Hierarchical correlation is to take information from multiple databases and aggregate them into a single <strong>Super SIEM</strong>. With the need to consume and retain huge amounts of data, comes the need to manage and oversee that data in an intelligent way. Hierarchical correlation is designed to enable parallel analytics across distributed data warehouses to aggregate their results. In the field of network monitoring, getting overwhelmed with data to the point where you cannot find what you need is a as useful as being given all the books in the world and asked a single question that is answered in only one.</span></p>
<p>Network traffic visibility is considerably improved by reducing network blindspots and providing qualified sources and reasons of communications that impair business continuity.The capacity to capture flow at a finer level allows for new Predictive AI Baselining and Machine Learning application analysis and risk mitigation.</p>
<p><span style="color: #000000;">There are so many critical abilities that a network monitoring solution must enable its user, all are affected by whether or not the solution can scale.<br></span></p>
<p><span style="color: #000000;">Visibility is a range and not binary, you do not have or don’t have visibility, its whether you have enough to achieve your goals and keep your organization productive and safe.</span></p>
</div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">5 Ways Flow Based Network Monitoring Solutions Need to Scale</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Use a Network Behavior Analysis Tool to Your Advantage</title>
		<link>https://cysight.ai/how-to-use-a-network-behavior-analysis-tool-to-your-advantage/</link>
		
		<dc:creator><![CDATA[Tomare Curran]]></dc:creator>
		<pubDate>Thu, 22 Aug 2024 11:39:12 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/how-netflow-solves-for-mandatory-data-retention-compliance-2/</guid>

					<description><![CDATA[<p>How to Use a Network Behavior Analysis Tool to Your Advantage Cybersecurity threats can come in many forms. They can easily slip through your network’s defenses if you let your guard down, even for a second. Protect your business by leveraging network behavior analysis (NBA). Implementing behavioral analysis tools helps organizations detect and stop suspicious...</p>
<p>The post <a href="https://cysight.ai/how-to-use-a-network-behavior-analysis-tool-to-your-advantage/">How to Use a Network Behavior Analysis Tool to Your Advantage</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="14342" class="elementor elementor-14342" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-63eb3ac3 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="63eb3ac3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17243b9f" data-id="17243b9f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-94e805c elementor-widget elementor-widget-heading" data-id="94e805c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default"><p align="center" style="margin-top:12.0pt;margin-right:0in;margin-bottom:12.0pt;margin-left:0in;text-align:center;line-height:normal"><span style="font-size:20.0pt;,sans-serif;color:black">How to Use a Network Behavior Analysis Tool to Your Advantage</span><span style="color: var( --e-global-color-primary );font-size: 26px;font-weight: var( --e-global-typography-primary-font-weight )"></span></p></h2>				</div>
				</div>
				<div class="elementor-element elementor-element-15cf1ebd elementor-widget elementor-widget-text-editor" data-id="15cf1ebd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Cybersecurity threats can come in many forms. They can easily slip through your network’s defenses if you let your guard down, even for a second. Protect your business by leveraging network behavior analysis (NBA). Implementing behavioral analysis tools helps organizations detect and stop suspicious activities within their networks before they happen and limit the damage if they <i>do </i>happen.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial', sans-serif;">According to Accenture</span><span style="font-family: 'Arial', sans-serif;">, </span><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">improving network security is the top priority for most companies this 2021. In fact, the majority of them have increased their spending on network security by more than 25% in the past months. </span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">With that, here are some ways to use network behavior anomaly detection tools to your advantage.</span></p><p style="text-indent: 0in; line-height: normal; mso-outline-level: 2; mso-list: l2 level1 lfo2; vertical-align: baseline; margin: .25in 0in 12.0pt 0in;"><!-- [if !supportLists]--><b><span style="font-size: 18.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: Arial; color: black;">1.     </span></b><!--[endif]--><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Leverage artificial intelligence</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Nowadays, you can easily leverage artificial intelligence (AI) and machine learning (ML) in your network monitoring. In fact, various software systems utilize  AI diagnostics to enhance the detection of any anomalies within your network. Through its dynamic machine learning, it can quickly learn how to differentiate between normal and suspicious activities.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">AI-powered NBA software can continuously adapt to new threats and discover outliers without much interference from you. This way, it can provide early warning on potential cyberattacks before they can get serious. This can include DDoS, Advanced Persistent Threats, and Anomalous traffic.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Hence, you should consider having AI diagnostics as one of your network behavior analysis magic quadrants.</span></p><p style="text-indent: 0in; line-height: normal; mso-outline-level: 2; mso-list: l2 level1 lfo2; vertical-align: baseline; margin: .25in 0in 12.0pt 0in;"><!-- [if !supportLists]--><b><span style="font-size: 18.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: Arial; color: black;">2.<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-weight: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">           </span></span></b><!--[endif]--><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Take advantage of its automation</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">One of the biggest benefits of a network anomaly detection program is helping you save time and labor in detecting and resolving network issues. It is constantly watching your network, collecting data, and analyzing activities within it. It will then notify you and your network administrators of any threats or anomalies within your network.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Moreover, it can automatically mitigate some security threats from rogue applications to prevent sudden downtimes. It can also eliminate blind spots within your network security, fortifying your defenses and visibility. As a result, you or your administrators can qualify and detect network traffic passively.</span></p><p style="text-indent: 0in; line-height: normal; mso-outline-level: 2; mso-list: l4 level1 lfo3; vertical-align: baseline; margin: .25in 0in 12.0pt 0in;"><!-- [if !supportLists]--><b><span style="font-size: 18.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: Arial; color: black;">3.<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-weight: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">           </span></span></b><!--[endif]--><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Utilize NBA data and analytics</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">As more businesses become data-driven, big data gains momentum. It can aid your marketing teams in designing better campaigns or your sales team in increasing your business’ revenues. And through network behavior analysis, you can deep-mine large volumes of data from day-to-day operations.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">For security engineers,</span><a href="https://www.netflowauditor.com/big-data-a-global-approach-to-local-threat-detection/"> <span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: #1155cc;">big data analytics</span></a><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;"> has become an effective defense against network attacks and vulnerabilities. It can give them deeper visibility into increasingly complex and larger network systems. </span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Today’s advanced analytics platforms are designed to handle and process larger volumes of data. Furthermore, these platforms can learn and evolve from such data, resulting in stronger network behavior analytics and local threat detection.</span></p><p style="text-indent: 0in; line-height: normal; mso-outline-level: 2; mso-list: l1 level1 lfo4; vertical-align: baseline; margin: .25in 0in 12.0pt 0in;"><!-- [if !supportLists]--><b><span style="font-size: 18.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: Arial; color: black;">4.<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-weight: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">           </span></span></b><!--[endif]--><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Optimize network anomaly detection</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">A common issue with network monitoring solutions is their tendency to overburden network and security managers with false-positive readings. This is due to the lack of in-depth information to confirm the actual cause of a network issue. Hence, it is important to consistently optimize your network behavior analysis tool.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">One way to do this is to use a</span><a href="https://www.netflowauditor.com/5-ways-flow-based-network-monitoring-solutions-need-to-scale/"> <span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: #1155cc;">flow-based analytics methodology</span></a><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;"> for your network monitoring. You can do so with software like CySight, which uses artificial intelligence to analyze, segment, and learn from granular telemetry from your network infrastructure flows in real-time. It also enables you to configure and fine-tune your network behavior analysis for more accurate and in-depth monitoring.</span></p><p style="text-indent: 0in; line-height: normal; mso-outline-level: 2; mso-list: l3 level1 lfo5; vertical-align: baseline; margin: .25in 0in 12.0pt 0in;"><!-- [if !supportLists]--><b><span style="font-size: 18.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: Arial; color: black;">5.<span style="font-variant-numeric: normal; font-variant-east-asian: normal; font-weight: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">           </span></span></b><!--[endif]--><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Integrate with other security solutions</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Enhance your experience with your network behavior analytics tool by integrating it with your existing security solutions, such as prevention technology (IPS) systems, firewalls, and more. </span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Through integrations, you can cross-analyze data between security tools for better visibility and more in-depth insights on your network safety. Having several security systems working together at once means one can detect or mitigate certain behaviors that are undetectable for the other. This also ensures you cover all the bases and leave no room for vulnerabilities in your network.</span></p><p style="line-height: normal; mso-outline-level: 2; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-size: 16.0pt; font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Improving network security</span><b></b></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">As your business strives towards total digital transformation, you need to start investing in your network security. Threats can come in many forms. And once it slips past your guard, it might just be too late.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Network behavior analysis can help fortify your network security. It constantly monitors your network and traffic and notifies you of any suspicious activities or changes. This way, you can immediately mitigate any potential issues before they can get out of hand. Check out CySight to know more about the benefits of network behavior analysis.</span></p><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">But, of course, a tool can only be as good as the people using it. Hence, you must make sure that you hire the right people for your network security team. Consider recruiting someone with an</span><a href="https://www.guide2research.com/degrees/best-online-software-engineering-degrees" target="_blank" rel="noopener"> <span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: #1155cc;">online software engineering masters</span></a><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;"> to help you strengthen your network.</span></p><hr /><p style="line-height: normal; margin: 12.0pt 0in 12.0pt 0in;"><span style="font-family: 'Arial',sans-serif; mso-fareast-font-family: 'Times New Roman'; color: black;">Ref: <a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pdf" target="_blank" rel="noopener"><span style="color: #3366ff;">Accenture Report</span></a><br /></span></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/how-to-use-a-network-behavior-analysis-tool-to-your-advantage/">How to Use a Network Behavior Analysis Tool to Your Advantage</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</title>
		<link>https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 07:07:14 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Advanced Netflow]]></category>
		<category><![CDATA[Flexible]]></category>
		<category><![CDATA[Granular]]></category>
		<category><![CDATA[Scalable Netflow]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=10</guid>

					<description><![CDATA[<p>Why is flows per second a flawed way to measure a netflow collector&#8217;s capability? Flows-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer’s flow capture (aka collection) rate. This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right?...</p>
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="Default"><strong><span lang="EN-US"> Why is flows per second a flawed way to measure a netflow collector&#8217;s capability?</span></strong></h3>
<p class="Default">Flows<span lang="EN-US">-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer</span><span lang="EN-US">’</span><span lang="EN-US">s flow capture (aka collection) rate.</span></p>
<p class="Default"><span lang="EN-US">This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right? Well, yes and no.</span></p>
<p class="Default"><strong><span lang="EN-US">The Basics<br />
</span></strong></p>
<p class="Default"><span lang="EN-US">NetFlow was originally conceived as a means to provide network professionals the data to make sense of the traffic on their network without having to resort to expensive per segment based packet sniffing tools.</span></p>
<p class="Default"><span lang="EN-US">A flow record contains at minimum the basic information pertaining to a transfer of data through a router, switch, firewall, packet tap or other network gateway. A typical flow record will contain at minimum: Source IP, Destination IP, Source Port, Destination Port, Protocol, Tos, Ingress Interface and Egress Interface. Flow records are exported to a flow collector where they are ingested and information orientated to the engineer</span><span lang="EN-US">’</span><span lang="EN-US">s purposes are displayed.</span></p>
<p class="Default"><strong><span lang="EN-US">Measurement</span></strong></p>
<p class="Default"><span lang="EN-US">Measurement has always been how the </span>IT industry express<span lang="EN-US">es</span> <span lang="EN-US">power and competency. However, a formula used to reflect power and ability changes when a technology design undergoes a paradigm shift.</span></p>
<p class="Default"><span lang="EN-US">For example, when expressing how fast a computer is we used to measure the CPU clock speed. We believed that the higher the clock speed the more powerful the computer. However, when </span><span lang="IT">multi-core chips</span><span lang="EN-US"> were introduced the CPU power and </span><span lang="NL">speed </span><span lang="EN-US">dropped but the CPU in fact became more powerful. The primary clock speed measurement indicator became secondary to the ability to multi-thread.</span></p>
<p class="Default"><span lang="EN-US">The f</span>lows<span lang="EN-US">-per-second yardstick is misleading as it incorrectly reflects the actual power and capability of a flow collector to capture and process flow data and it has become prone to marketing exaggeration.</span></p>
<p class="Default"><strong><span lang="EN-US">Flow Capture Rate</span></strong></p>
<p class="Default"><span lang="EN-US">Flow capture rate ability is difficult to measure and to quantify a products scalability. There are various factors that can dramatically impact the ability to collect flows and to retain</span> <span lang="EN-US">sufficient </span>flows<span lang="EN-US"> to perform higher-end diagnostics.</span></p>
<p class="Default"><span lang="EN-US">I</span>t<span lang="FR">’</span><span lang="EN-US">s important to look not just at flows-per-second but at the granularity retained per minute (flow retention rate), the speed and flexibility of alerting, reporting, forensic depth and diagnostics and the scalability when impacted by high-flow-variance, sudden-bursts, number of devices and interfaces, the speed of reporting over time, the ability to retain short-term and historical collections and the confluence of these factors as it pertains to scalability of the software as a whole.</span></p>
<p class="Default"><span lang="EN-US">Scalable NetFlow and flow retention rates are particularly critical to determine as appropriate granularity is needed to deliver the visibility required to perform A</span>nomaly <span lang="EN-US">Detection, Network Forensics, Root Cause Analysis, Billing substantiation, Peering Analysis and Data retention compliance.</span></p>
<p class="Default"><strong><span lang="EN-US">The higher the flows-per-second and the flow-variance the more challenging it becomes to achieve a high flow-retention-rate to archive and retain flow records in a data warehouse</span>.</strong></p>
<p class="Default">A vendor<span lang="EN-US">’</span><span lang="EN-US">s capability statement might reflect a high flows-per-second consumption ability but many</span> <span lang="EN-US">flow software </span><span lang="NL">tools </span><span lang="EN-US">have retention rate limitations by design.</span></p>
<p class="Default"><span lang="EN-US">It can mean that irrespective of achieving a high flow collection rate the netflow analyzer might only be capable of physically archiving</span> <span lang="EN-US">5</span>00 flows<span lang="EN-US"> per minute. Furthermore, these flows are usually the result of sorting the flow data by top </span>byte<span lang="EN-US">s to identify </span><span lang="EN-US">“</span><span lang="EN-US">Top 10</span><span lang="EN-US">” </span><span lang="EN-US">bandwidth abusers. Netflow products of this kind can be easily identified because they often tend to offer benefits orientated primarily to identifying bandwidth abuse or network performance monitoring.</span></p>
<p class="Default"><span lang="EN-US">Identifying bandwidth abusers is of course a very important benefit of a netflow analyzer. However, it has a marginal benefit today where a large amount of the abuse and risk is caused by many small flows.</span></p>
<p class="Default"><span lang="EN-US">These small flows usually fall beneath the radar screen of many netflow analysis products.</span>  <span lang="EN-US">Many abuses like DDoS, </span>p2p<span lang="EN-US">, botnets</span> <span lang="EN-US">and hacker or insider data exfiltration continue to occur and can at minimum impact the networking equipment and user experience. Lack of ability to quantify and understand small flows creates great risk leaving organizations exposed.</span></p>
<p class="Default"><strong><span lang="EN-US">Scalability</span></strong></p>
<p class="Default"><span lang="EN-US">This inability to scale in short-term</span> <span lang="EN-US">or historical analysis severely impacts a flow monitoring product</span><span lang="EN-US">’</span><span lang="EN-US">s ability to collect and retain critical information required in today</span><span lang="EN-US">’</span><span lang="EN-US">s world where copious data has created severe network blind spots</span>.</p>
<p class="Default"><span lang="IT">To qualify </span><span lang="EN-US">if a tool is really suitable for the purpose, you need to know more about the flows-per-second collection formula being provided by the vendor and <a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">some deeper investigation</a></span> <span lang="EN-US"><a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">should be carried out to qualify the claims</a>.</span></p>
<p class="Default"><strong><span lang="EN-US"> </span></strong></p>
<p class="Default"><strong><span lang="EN-US">With this in mind here are 3 key questions to <a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">ask your </a></span><span lang="EN-US"><a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">NetFlow</a> vendor to understand what their collection scalability claims really mean:</span></strong></p>
<ol>
<li class="Default"><strong><span lang="EN-US">How many </span>flow<span lang="EN-US">s</span> </strong><span lang="EN-US"><strong>can be collected per second?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ol>
<ul>
<li class="Default">Qualify if the flows per second rate provided is a burst rate or a sustained rate.</li>
<li class="Default">Ask how the collection and retention rates might be affected if the flows have high-flow variance (e.g. a DDoS attack).</li>
<li class="Default">How is the collection, archiving and reporting impacted when flow variance is increased by adding many devices and interfaces and distinct IPv4/IPv6 conversations and test what degradation in speed can you expect after it has been recording for some time.</li>
<li class="Default">Ask how the collection and retention rates might change if adding additional fields or measurements to the flow template (e.g. MPLS, MAC Address, URL, Latency)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">How many </span></strong><span lang="EN-US"><strong>flow records can be retained per minute?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ul>
<ul>
<li>Ask how the actual number of records inserted into the data warehouse per minute can be verified for short-term and historical collection.</li>
<li>Ask what happens to the flows that were not retained.</li>
<li>Ask what the flow retention logic is. (e.g. Top Bytes, First N)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">What information granularity is retained for both short-term and historically</span>?</strong>
<ul>
<li><span lang="EN-US">Does the data</span><span lang="EN-US">’</span><span lang="EN-US"><span lang="EN-US">s time granularity degrade as the data ages e.g. 1 day data retained per minute, 2 days retained per hour 5 days retained per quarter</span></span></li>
<li>Can you control the granularity and if so for how long?</li>
</ul>
</li>
</ul>
<p><strong><span lang="EN-US"> </span></strong></p>
<p><strong><span lang="EN-US">Remember &#8211; Rate of collection does not translate to information retention.</span></strong></p>
<p><span lang="EN-US">Do you know what</span><span lang="EN-US">’</span><span lang="EN-US">s really stored in the software&#8217;s database? After all you can only analyze what has been retained (either in memory or on disk) and it is that information retention granularity that provides a flow products benefits.</span></p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
<p class="Default">
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Big Data &#8211; A Global Approach To Local Threat Detection</title>
		<link>https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Sat, 27 Jul 2024 09:42:51 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=55</guid>

					<description><![CDATA[<p>From helping prevent loss of life in the event of a natural disaster, to aiding marketing teams in designing more targeted strategies to reach new customers, big data seems to be the chief talking point amongst a broad and diverse circle of professionals. For Security Engineers, big data analytcs is proving to be an effective...</p>
<p>The post <a href="https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/">Big Data &#8211; A Global Approach To Local Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>From helping prevent loss of life in the event of a natural disaster, to aiding marketing teams in designing more targeted strategies to reach new customers, big data seems to be the chief talking point amongst a broad and diverse circle of professionals.</p>
<p>For Security Engineers, big data analytcs is proving to be an effective defense against evolving network intrusions thanks to the delivery of near real-time insights based on high volumes of diverse network data. This is largely thanks to technological advances that have resulted in the capacity to transmit, capture, store and analyze swathes of data through high-powered and relatively low-cost computing systems.</p>
<p>In this blog, we&#8217;ll take a look at how big data is bringing deeper visibility to security teams as environments increase in complexity and our reliance on pervading network systems intensifies.</p>
<h2><strong>Big data analysis is providing answers to the data deluge dilemma</strong></h2>
<p>Large environments generate gigabytes of raw user, application and device metrics by the minute, leaving security teams stranded in a deluge of data. Placing them further on the back foot is the need to sift through this data, which involves considerable resources that at best only provide a retrospective view on security breaches.</p>
<p>Big data offers a solution to the issue of “<em>too much data too fast</em>” through the rapid analysis of swathes of disparate metrics through advanced and evolving analytical platforms. The result is actionable security intelligence, based on comprehensive datasets, presented in an easy-to-consume format that not only provides historic views of network events, but <a href="https://cysight.ai/netflow-for-advanced-threat-detection">enables security teams to better anticipate threats as they evolve</a>.</p>
<p>In addition, big data&#8217;s ability to facilitate more accurate predictions on future events is a strong motivating factor for the adoption of the discipline within the context of information security.</p>
<h2><strong>Leveraging big data to build the secure networks of tomorrow</strong></h2>
<p>As new technologies arrive on the scene, they introduce businesses to new opportunities &#8211; and vulnerabilities. However, the application of Predictive AI Baselining analytics to network security in the context of the evolving network is helping to build the secure, stable and predictable networks of tomorrow. Detecting modern, more advanced threats requires big data capabilities from incumbent intrusion prevention and detection (IDS\IPS) solutions to distinguish normal traffic from potential threats.</p>
<p>By contextualizing diverse sets of data, Security Engineers can more effectively detect stealthily designed threats that traditional monitoring methodologies often fail to pick up. For example, Advanced Persistent Threats (APT) are notorious for their ability to go undetected by masking themselves as day-to-day network traffic. These low visibility attacks can occur over long periods of time and on separate devices, making them difficult to detect since no discernible patterns arise from their activities through the lens of traditional monitoring systems.</p>
<p>Big data Predictive AI Baselining analytics lifts the veil on threats that operate under the radar of traditional signature and log-based security solutions by contextualizing traffic and giving NOCs a deeper understanding of the data that traverses the wire.</p>
<p><a href="https://www.gartner.com/newsroom/id/2663015">Gartner states that</a>, <em>“Big data Predictive AI Baselining analytics enables enterprises to combine and correlate external and internal information to see a bigger picture of threats against their enterprises.”  </em>It also eliminates the siloed approach to security monitoring by converging network traffic and organizing it in a central data repository for analysis; resulting in much needed granularity for effective intrusion detection, prevention and <a href="https://cysight.ai/balancing-granularity-against-network-security-forensics">security forensics</a>.</p>
<p>In addition, Predictive AI Baselining analytics eliminates barriers to internal collaborations between Network, Security and Performance Engineers by further contextualizing network data that traditionally acted as separate pieces of a very large puzzle.</p>
<h2><strong>So is big data Predictive AI Baselining analytics the future of network monitoring?</strong></h2>
<p>In a way, NOC teams have been using big data long before the discipline went mainstream<em>. </em>Large networks have always produced high volumes of data at high speeds &#8211; only now, that influx has intensified exponentially.</p>
<p>Thankfully, with the rapid evolution of computing power at relatively low cost, the possibilities of what our data can tell us about our networks are becoming more apparent.</p>
<p>The timing couldn&#8217;t have been more appropriate since traditional perimeter-based IDS\IPS no longer meet the demands of modern networks that span vast geographical areas with multiple entry points.</p>
<p>In the age of cloud, mobility, ubiquitous Internet and the ever-expanding enterprise environment, big data capabilities will and should become an intrinsic part of virtually every security apparatus.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/">Big Data &#8211; A Global Approach To Local Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Nobelium Hack</title>
		<link>https://cysight.ai/microsoft-nobelium-hack/</link>
					<comments>https://cysight.ai/microsoft-nobelium-hack/#respond</comments>
		
		<dc:creator><![CDATA[Tomare Curran]]></dc:creator>
		<pubDate>Sat, 13 Jul 2024 14:39:08 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/?p=13940</guid>

					<description><![CDATA[<p>Solarwinds Hackers Strike Again Another painful round of cyber-attacks carried out by what Microsoft discovered to be a Russian state-sponsored hacking group called Nobelium, this time attacking Microsoft support agent&#8217;s computer, exposing customer&#8217;s subscription information.  The activity tracked by Microsoft led to Nobelium, the same group that executed the solarwinds orion hack last year December...</p>
<p>The post <a href="https://cysight.ai/microsoft-nobelium-hack/">Microsoft Nobelium Hack</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13940" class="elementor elementor-13940" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-960e4a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="960e4a3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7851e6" data-id="f7851e6" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0dc52b8 elementor-widget elementor-widget-heading" data-id="0dc52b8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Solarwinds Hackers Strike Again</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-64de076 elementor-widget elementor-widget-text-editor" data-id="64de076" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p class="MsoNormal">Another painful round of cyber-attacks carried out by what Microsoft discovered to be a Russian state-sponsored hacking group called Nobelium, this time attacking Microsoft support agent&#8217;s computer, exposing customer&#8217;s subscription information. </p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-3c756a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3c756a3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14febb4" data-id="14febb4" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-ecd9a80 elementor-widget elementor-widget-text-editor" data-id="ecd9a80" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The activity tracked by Microsoft led to Nobelium, the same group that executed the <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://www.netflowauditor.com/netflowauditor_solves_sunburst/"><b>solarwinds orion hack</b></a></span> last year December 2020. The attack was first discovered when an “information-stealing malware” on one of Microsoft’s customer support agent’s machine was detected by Microsoft themselves. Infiltration occurred using <b>password spraying</b> and <b>brute force </b>attacks, attempting to gain access to the Microsoft accounts.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-41ad7a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="41ad7a4" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f828dd" data-id="7f828dd" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-cf9e2bd elementor-widget elementor-widget-text-editor" data-id="cf9e2bd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Microsoft said Nobelium had targeted over 150 organizations worldwide in the last week, including government agencies, think tanks, consultants, and nongovernmental organizations, reaching over 3000 email accounts mostly in the USA but also present in at least 24 other countries. This event is said to be an “active incident”, meaning this attack is very much Live and more has yet to be discovered. Microsoft is attempting to notify all who are affected.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-22dd785 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="22dd785" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5cbbf88" data-id="5cbbf88" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5f75b98 elementor-widget elementor-widget-text-editor" data-id="5f75b98" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The attack carried out was done through an email marketing account belonging to the U.S Agency for International Development. Recipients of the email received a phishing email that looked authentic but contained a malicious file inserted into a link. Once the file was downloaded, the machine is compromised and a back door is created, enabling the bad actor to steal data along with infecting other machines on the network.</p><p>In April this year, the Biden administration pointed the finger at the Russian Foreign Intelligence Service (SVR) for being responsible for the solarwinds attack, exposing the Nobelium group. It appears that this exposure led the group to drop their stealth approach they have been using for months and on May 25 they ran a “spear phishing” campaign, causing a zero-day vulnerability.</p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d56d436" data-id="d56d436" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a96fb22 elementor-widget elementor-widget-image" data-id="a96fb22" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="854" height="641" src="https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-1024x768.png" class="attachment-large size-large wp-image-13947" alt="Nobelium Phishing Attack" srcset="https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-1024x768.png 1024w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-300x225.png 300w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-768x576.png 768w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-512x384.png 512w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-24x18.png 24w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-36x27.png 36w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-48x36.png 48w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-350x263.png 350w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack-600x450.png 600w, https://cysight.ai/wp-content/uploads/Nobelium-Phishing-Attack.png 1200w" sizes="(max-width: 854px) 100vw, 854px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7a60200 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7a60200" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9729798" data-id="9729798" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-18dcf31 elementor-widget elementor-widget-heading" data-id="18dcf31" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Staying in Control of your Network</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-4da26f6 elementor-widget elementor-widget-text-editor" data-id="4da26f6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>IdeaData&#8217;s Marketing Manager, Tomare Curran, stated on the matter, &#8220;These kinds of threats can hide and go unnoticed for years until the botnet master decides to activate the malware. Therefore, it&#8217;s imperative to maintain flow metadata records of every transaction so that when a threat finally comes to light you can set Netflow Auditor&#8217;s HindSight Threat Analyzer to search back and help you find out if or when you were compromised and what else could have been impacted.&#8221;</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-2643e40 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2643e40" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e53d49" data-id="4e53d49" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-84f4651 elementor-widget elementor-widget-text-editor" data-id="84f4651" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>NetFlow Auditor constantly keeps its eyes on your Network and provides total visibility to quickly identify and alert on who is doing What, Where, When, with Whom and for How Long right now or months ago. It baselines your network to discover unusual network behaviors and using machine learning and A.I. diagnostics will provide early warning on anomalous communications.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-23e0e4e elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="23e0e4e" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8cc0711" data-id="8cc0711" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-69570b2 elementor-widget elementor-widget-text-editor" data-id="69570b2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cyber security experts at IdeaData do not believe the group will stop their operations due to being exposed. IdeaData is offering <span style="color: #0000ff;"><a style="color: #0000ff;" href="http://netflowauditor.com/">Netflow Auditor&#8217;s Integrated Cyber Threat Intelligence solution</a> </span>free for <a href="http://netflowauditor.com/"><span style="color: #0000ff;">60 days</span></a> to allow companies to help cleanse their network from newly identified threats.</p><p>Have any questions?</p><p>Contact us at:  tomare.curran@netflowauditor.com</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/microsoft-nobelium-hack/">Microsoft Nobelium Hack</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cysight.ai/microsoft-nobelium-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NetFlow for Advanced Threat Detection</title>
		<link>https://cysight.ai/netflow-for-advanced-threat-detection/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Mon, 24 Jun 2024 07:00:38 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=36</guid>

					<description><![CDATA[<p>Businesses spend a lot of effort and expense setting up their networks to provide all the data flows and applications necessary so that their employees are very productive in performing their tasks. These networks are vital assets to the business and require absolute protection against unauthorized access, malicious programs, and degradation of performance of the...</p>
<p>The post <a href="https://cysight.ai/netflow-for-advanced-threat-detection/">NetFlow for Advanced Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="hs-blog-social-share">Businesses spend a lot of effort and expense setting up their networks to provide all the data flows and applications necessary so that their employees are very productive in performing their tasks.</div>
<div class="section post-body">
<p>These networks are vital assets to the business and require absolute protection against unauthorized access, malicious programs, and degradation of performance of the network. It is no longer enough to only use Anti-Virus applications.</p>
<p>By the time malware is detected and those signatures added to the antiviral definitions, access is obtained and havoc wreaked or the malware is buried itself inside the network and is obtaining data and passwords for later exploitation.</p>
<p>An article by Drew Robb in eSecurity Planet on September 3, 2015 (https://www.esecurityplanet.com/network-security/advanced-threat-detection-buying-guide-1.html) cited the Verizon 2015 Data Breach Investigations Report where 70 respondents reported over 80,000 security incidents which led to more than 2000 serious breaches in one year.</p>
<p>The report noted that phishing is commonly used to gain access and the malware  then accumulates passwords and account numbers and learns the security defenses before launching an attack.  A telling remark was made, &#8220;It is abundantly clear that traditional security solutions are increasingly ineffectual and that vendor assurances are often empty promises,&#8221; said Charles King, an analyst at Pund-IT. &#8220;Passive security practices like setting and maintaining defensive security perimeters simply don’t work against highly aggressive and adaptable threat sources, including criminal organizations and rogue states.&#8221;</p>
<p>So what can businesses do to protect themselves? How can they be proactive in addition to the passive perimeter defenses?</p>
<p>The very first line of defense is better education of users. In one test, an e-mail message was sent to the users, purportedly from the IT department, asking for their passwords in order to &#8220;upgrade security.&#8221; While 52 people asked the IT department if this was a real request, 110 mailed their passwords right back. In their attempts to be productive, over half of the recipients of phishing e-mails responded within an hour!</p>
<p>Another method of advanced threat protection is <a href="https://cysight.ai/what-is-netflow-how-can-organizations-leverage-it">NetFlow Monitoring</a>.</p>
<p>IT department and Managed service providers (MSP&#8217;s), can use monitoring capabilities to detect, prevent, and report adverse effects on the network.</p>
<p>Traffic monitoring, for example, watches the flow of information and data traversing critical nodes and network links. Without using intrusive probes, this information helps decipher how applications are using the network and which ones are becoming bandwidth hogs. These are then investigated further to determine what is causing the problem and how best to manage the issue. Just adding more bandwidth is not the answer!</p>
<p>IT departments review this data to investigate which personnel are the power users of which applications, when the peak traffic times are and why, and similar information in addition to flagging and diving in-depth to review anomalies that indicate a potential problem.</p>
<p>If there are critical applications or services that the clients rely on for key account revenue streams, IT can provide real-time monitoring and display of the health of the networks supporting those applications and services. It is this ability to observe, analyze, and report on the network health and patterns of usage that provides the ability to make better decisions at the speed of business that CIO&#8217;s crave.</p>
<p>CySight excels at network Predictive AI Baselining analytics solutions. It scales to collect, analyze, and report on Netflow datastreams of over one million flows/second. Their team of specialists have prepped, installed, and deployed over 1000 CySight performance monitoring solutions, including over 50 Fortune 1000 companies and some of the largest ISP/Telco&#8217;s in the world. A global leader and recognized by winning awards for Security and Business Intelligence at the World Congress of IT, CySight is also welcomed by Cisco as a Technology Development Partner.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/netflow-for-advanced-threat-detection/">NetFlow for Advanced Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 Ways Anomaly Detection Enhances Network Monitoring</title>
		<link>https://cysight.ai/3-ways-anomaly-detection-enhances-network-monitoring/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Mon, 20 May 2024 10:30:47 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=52</guid>

					<description><![CDATA[<p>With the increasing abstraction of IT services beyond the traditional server room computing environments have evolved to be more efficient and also far more complex. Virtualization, mobile device technology, hosted infrastructure, Internet ubiquity and a host of other technologies are redefining the IT landscape. From a cybersecurity standpoint, the question is how to best to...</p>
<p>The post <a href="https://cysight.ai/3-ways-anomaly-detection-enhances-network-monitoring/">3 Ways Anomaly Detection Enhances Network Monitoring</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>With the increasing abstraction of IT services beyond the traditional server room computing environments have evolved to be more efficient and also far more complex. Virtualization, mobile device technology, hosted infrastructure, Internet ubiquity and a host of other technologies are redefining the IT landscape.</p>
<p>From a cybersecurity standpoint, the question is how to best to manage the growing complexity of environments and changes in network behavior with every introduction of new technology.</p>
<p>In this blog, we&#8217;ll take a look at how anomaly detection-based systems are adding an invaluable weapon to Security Analysts&#8217; arsenal in the battle against known – and unknown &#8211; security risks that threaten the stability of today&#8217;s complex enterprise environments.</p>
<p><strong>Put your network traffic behavior into perspective</strong></p>
<p>By continually analyzing traffic patterns at various intersections and time frames, performance and security baselines can be established, against which potential malicious activity is monitored and managed. But with large swathes of data traversing the average enterprise environment at any given moment, detecting abnormal network behavior can be difficult.</p>
<p>Through filtering techniques and algorithms based on live and historical data analysis, anomaly detection systems are capable of detecting even the most subtly crafted malicious software that may pose as normal network behavior. Also, anomaly-based systems employ machine-learning capabilities to learn about new traffic as it is introduced and provide greater context to how data traverses the wire, thus increasing its ability to identify security threats as they are introduced.</p>
<p><a href="https://cysight.ai/how-to-achieve-data-retention-and-security-compliance-obligations-with-netflow">Netflow</a> is a popular tool used in the collection of network traffic for building accurate performance and cybersecurity baselines with which to establish normal network activity patterns from potentially alarming network behavior.</p>
<p><strong>Anomaly detection places Security Analysts on the front foot</strong></p>
<p>An anomaly is defined as an action or event that is outside of the norm. But when a definition of what is normal is absent, loopholes can easily be exploited. This is often the case with signature-based detection systems that rely on a database of pre-determined virus signatures that are based on known threats. In the event of a new and yet unknown security threat, signature-based systems are only as effective as their ability to respond to, analyze and neutralize such new threats.</p>
<p>Since signatures do work well against known attacks, they are by no means paralyzed against defending your network. Signature-based systems lack the flexibility of anomaly-based systems in the sense that they are incapable of detecting new threats. This is one of the reasons signature-based systems are typically complemented by some iteration of a flow based anomaly detection system.</p>
<p><strong>Anomaly based systems are designed to grow alongside your network</strong></p>
<p>The chief strength behind anomaly detection systems is that they allow Network Operation Centers (NOCs) to adapt their security apparatus according to the demands of the day. With threats growing in number and sophistication, detection systems that can discover, learn about and provide preventative methodologies  are the ideal tools with which to combat the cybersecurity threats of tomorrow. NetFlow Anomaly detection with automated diagnostics does exactly this by employing machine learning techniques to network threat detection and in so doing, automating much of the detection aspect of security management while allowing Security Analysts to focus on the prevention aspect in their ongoing endeavors to secure their information and technological investments.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/3-ways-anomaly-detection-enhances-network-monitoring/">3 Ways Anomaly Detection Enhances Network Monitoring</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identifying ToR threats without De-Anonymizing</title>
		<link>https://cysight.ai/identifying-tor-threats-without-de-anonymizing/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Fri, 17 May 2024 08:08:41 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=77</guid>

					<description><![CDATA[<p>Part 3 in our series on How to counter-punch botnets, viruses, ToR and more with Netflow focuses on ToR threats to the enterprise. ToR (aka Onion routing) and anonymized p2p relay services such as Freenet is where we can expect to see many more attacks as well as malevolent actors who are out to deny your service...</p>
<p>The post <a href="https://cysight.ai/identifying-tor-threats-without-de-anonymizing/">Identifying ToR threats without De-Anonymizing</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>Part 3 in our series on <strong><a href="https://cysight.ai/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1">How to counter-punch botnets, viruses, ToR and more with Netflow</a> </strong>focuses on ToR threats to the enterprise.</p>
<p>ToR (aka Onion routing) and anonymized p2p relay services such as Freenet is where we can expect to see many more attacks as well as malevolent actors who are out to deny your service or steal your valuable data. Its useful to recognize that flow Predictive AI Baselining analytics provides the best and cheapest means of de-anonymizing or profiling this traffic.</p>
<p>“The biggest threat to the Tor network, which exists by design, is its vulnerability to traffic confirmation or correlation attacks. This means that if an attacker gains control over many entry and exit relays, they can perform statistical traffic analysis to determine which users visited which websites.” (<a href="https://www.computerworld.com.au/article/576210/tor-connections-hidden-services-could-easy-de-anonymize/">source</a>)</p>
<p>According to a paper entitled “On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records” by Sambuddho Chakravarty, Marco V. Barbera,, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis they point out that in the lab they can qualify that “<a href="https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&amp;format=pdf&amp;"><strong>81 Percent of Tor Users Can Be Hacked with Traffic Analysis Attack”</strong></a>.</p>
<p>It continues to be a cat and mouse game that requires both new innovative approaches to find ToR weaknesses coupled with correlation attacks to identify routing paths. To do this in real life is becoming much simpler but the real challenge is that it requires cooperation and coordination of business, ISPs and governments. The deployment of cheap and easy to deploy micro-taps that can act both as a ToR relay and a flow exporter concurrently combined with a NetFlow toolset that can scale hierarchically to analyze flow data with path analysis at each point in parallel across a multitude of ToR relays can make this task easy and cost effective.</p>
<p><strong>So what can we do about ToR today?</strong></p>
<p>Even without de-anonymizing ToR traffic there is a lot of intelligence that can be gained simply by analyzing ToR Exit and relay behavior. Using a flow tool that can change perspectives between flows, packets, bytes, counts or tcp flag counts allows you to qualify if a ToR node is being used to download masses of data or is trickling out data.</p>
<p>Patterns of data can be very telling as to what is the nature of the data transfer and can be used in conjunction with other information to become a useful indicator of the risk. As for supposedly secured networks I can’t think of any instance where ToR/Onion routing or for that matter any external VPN or Proxy service is needed to be used from within what is supposed to be a locked environment. Once ToR traffic has been identified communicating in a sensitive environment it is essential to immediately investigate and stop the IP addresses engaging in this suspicious behavior.</p>
<p>Using a tool like <a href="https://cysight.ai/free-trial">CySight</a>’s advanced End-Point Threat Detection allows NetFlow data to be correlated against hundreds of thousands of IP addresses of questionable reputation including ToR exits and relays in real-time with comprehensive historical forensics that can be deployed in a massively parallel architecture.</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img loading="lazy" decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/identifying-tor-threats-without-de-anonymizing/">Identifying ToR threats without De-Anonymizing</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
