sb-au logo
Story image

ExtraHop launches threat monitoring service 'Addy' in Australia

22 Aug 2017

Data analytics company ExtraHop has announced the Australian launch of what calls an ‘industry-first’ SaaS offering that uses machine learning to analyse all digital interactions.

The machine learning service, called ‘Addy’, is able to observe and analyse all digital interactions. It uses machine learning to detect anomalies as they happen, which enables a data-driven approach to securing the digital experience.

“The real-time network analytics ExtraHop provides already helps Australian companies better understand their environment and detect threats,” comments ExtraHop’s senior VP, Bryce Hein.

The company says that often traffic patterns change, devices on the network come and go, and most people don’t have the time to configure manual thresholds. Machine learning automatically sifts through metrics, a task that would be impossible to do manually.

The company cites statistics from Accenture’s High Performance Security Report 2016, which found that 65% of breaches are discovered by internal security teams. In Australia, half of respondents said it takes ‘months’ to detect breaches.

“Current and future demands of infrastructure and operations (I&O) require a specific, strategic investment in a platform that is designed to collect and analyse data from any source with the assistance of increasingly intelligent machines,” adds Gartner analyst Colin Fletcher.

As a result, ExtraHop designed the machine learning service to build baselines for each device, network and application. It also uses in-house and crowdsourced domain expertise to complement the core service and eliminate false positives over time.

Network traffic and application performance is extremely cyclical; past behaviour is a strong predictor of future behaviour,” the company says in its blog.

“As part of our research, we isolated a set of features in wire data that have the highest probability of correlation with relevant IT operation and security anomalies. Addy extracts metrics to tune a model with a custom machine-learning algorithm. The service continuously checks device and network behaviours through metrics collected by the ExtraHop systems and applies that data against the model it built. It then generates an alert when there are anomalous behaviours that might affect IT operations or security.”

According to ExtraHop, Addy can be paired with the company’s analytics-first workflow which alerts teams to performance and security issues.

“With Addy, we’re bringing machine learning to bear, helping surface performance and security anomalies faster than ever, and cutting through the noise to keep IT and security teams focused on the most important issues. Not only will this help them stay secure and compliant, but it will also help ensure a better digital experience for customers,” Hein concludes.

Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Story image
5 ways to use data science to predict security issues - Forcepoint
Data science enables people to respond to problems in a better way, and to also understand those problems in a way that would not have been possible 50 years ago.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More