Story image

Endace joins IBM Security app exchange community

15 Jan 2019

Network recording and analytics hosting company Endace has launched the EndaceProbe integration with IBM Security to enable customers to retrace detailed, step-by-step actions of an attacker to accelerate forensic investigation.

EndaceProbe Network Analytics Platform captures, indexes, and stores network traffic with 100% accuracy while hosting a variety of network security and performance monitoring applications in Application Dock, EndaceProbe’s built-in hosting environment.

The new application is available to the security community through IBM Security App Exchange, a marketplace where developers across the industry can create applications based on IBM Security technologies.

As threats are evolving faster than ever, collaborative development amongst the security community will help organisations adapt quickly and speed innovation in the fight against cybercrime.

EndaceProbe leverages IBM Security QRadar, the company’s security intelligence platform, which analyses data across an organisation’s IT infrastructure in real-time to identify potential security threats.

Leveraging QRadar’s open application programming interfaces (API), EndaceProbe allows Endace and IBM customers to understand and respond to network events, including everything from anomalous behaviour to insider and advanced threats.

Endace CEO Stuart Wilson says, “Corporate networks are more vulnerable than ever to an accelerating volume of threats, and security analysts need to understand what’s happened with a threat to accelerate security investigation and response.”

“Leveraging the Pivot-to-Vision API integration of EndaceProbes, analysts can click on an alert in QRadar to go directly to view the related packets in EndaceVision, the EndaceProbe’s built-in investigation tool, to see what’s happened so they can respond appropriately.”

Endace’s multifunctional Analytics Platform can host third-party network analytics applications while recoding a 100% accurate Network History, providing evidence for investigating cybersecurity threats, quantifying data breaches and analysing network or application performance problems.

Deploying a dedicated Analytics Platform enables agile deployment of analytics functions on-demand and dramatically reduces OPEX and CAPEX costs by consolidating data centre hardware.

Hosted analytics applications can analyse live traffic at full line rate, or use Playback to analyse historical traffic for powerful, back-in-time analysis. 

Endace’s customers include banks, hospitals, telcos, broadcasters, retailers, governments, and military. 

IBM’s security platform provides the security intelligence to help organisations holistically protect their people, data, applications, and infrastructure.

IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more.

Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
D-Link A/NZ launches new home wireless surveillance kit
The Omna Wire-Free Full HD cameras and accompanying Wi-Fi Hub offer a number of new features, including Alexa/Assistant support.
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.