Netography today announced further innovation to its Netography Fusion® platform, delivering scalable, continuous network visibility and control required by security operations center (SOC) and cloud operations teams. Netography Fusion enables organizations to significantly reduce cyber threat risks and costly downtime in real-time with improved security and business context, as well as powerful remediation automation capabilities through alerts, custom detections, and integrations. The platform is the only security product that secures the Atomized Network—including legacy, on-premises, hybrid, multi-cloud, and edge environments.
“Since the pandemic hit, networks have rapidly evolved into composites of multi-cloud, hybrid-cloud, and on-prem infrastructure with mobile and remote workforces. The implications for network security are massive,” said Martin Roesch, Netography CEO. “The Atomized Network is elastic, ephemeral, and encrypted, and organizations are blinded to the composition of their networks and entire categories of attack. This creates gaps where attackers can hide between the technologies and operational teams who use them. Defending the Atomized Network must be done in real-time, detecting and responding to threats as they emerge with a solution architected for the world we are now in.”
Netography Fusion is a cloud-scale, network-centric platform; it reconstitutes capabilities disrupted by the combined impact of encryption in security-as-a-service (SaaS) and Zero Trust environments and atomization and replaces network-scoped capabilities formerly delivered by deep packet inspection (DPI) hosted on appliances. It also provides visibility in places where Endpoint Detection and Response (EDR) solutions simply cannot see independently. A frictionless deployment model enables defenders to secure their Atomized Networks immediately, when, and where needed.
Newly added context labels and tagging allow security and cloud teams to visualize and analyze networks by application, location, compliance groups, or any other scheme. The UX/UI provides analysts with a flexible and optimized workflow to pivot and analyze massive amounts of data quickly.
“Multiple teams, including the SOC and Cloud Ops teams at FICO are continuing to expand their use of Netography Fusion’s scalable network visibility and control platform,” said Shannon Ryan, Senior Director, Core Security Services and Architecture, FICO. “The addition of context labels enables new use cases, including policies that we can apply to specific applications or our on-premises or multi-cloud infrastructure, enabling us with visibility and alerts for specific compliance controls. Context labels also make it easier for more team members to analyze incidents and answer audit questionnaires quicker.”
Netography Fusion customers also:
Close Visibility Gaps: From north-south to east-west and cloud to cloud only Netography Fusion provides the actionable visibility teams need.
Analyze Incidents and Alerts with Context: Context labels are provisioned by loading context from both cloud and on-prem infrastructure, allowing custom searches with Netography’s Query Language (NQL) to set up detections, alerts, and reports all with security or business context.
Squash Silos Between Teams: From security operations to IT to cloud operations, DevOps, threat hunters, forensics, and risk and compliance, all benefit from a single source of truth, the enriched Flow logs, and context.
Lower Mean Time to Detect (MTTD): Netography Fusion’s robust visualization and graphing interfaces combine with NQL and Netography Detection Models (NDM) to enable security teams to stop attacks quickly and limit the “blast zone” of those attacks.
Lower Mean Time to Respond (MTTR): Teams will have unprecedented control to limit downtime and the costs associated with remediating post intrusion. Regaining control of your network in the face of a successful breach is key to minimizing the cost of breaches and getting back to business.
Supercharge Threat Hunting: Forensics teams can achieve gap-free visibility and flexible data retention policies to investigate incidents, understand the attack path and implement proactive measures to prevent future intrusions and reduce attacker dwell time.
Accelerate Audits and Improve Compliance: Streamline audits and proof of network policy enforcement with context labeling, tagging, and flexible retention capabilities. Teams can isolate network traffic visibility and control by application, location, line of business (LOB), asset type, and more.
Get More Out of Existing Tech Stack: Extend endpoint visibility and control capabilities to devices and network points that do not support agents, or simply cannot do so cost-effectively. Teams gain comprehensive support for alerting platforms like PagerDuty, Slack, Teams, Twilio, and more via Webhook functionality.
###