NCA is pleased to announce a break-through security service we call Security Analytics

NCA is pleased to announce a break-through security service we call Security Analytics.

According to the 2013 Verizon Data Breach Investigations Report most breaches take months or even years to detect.  Why is this true when everyone has technology such as firewalls, intrusion detection systems, sandboxes, and anti-malware software?  As the study and our own experience indicates, many threat vectors are undetectable by current methods.  The role of active hackers has evolved to include nation-states, organized crime, and corporate spies.  As their methods become more sophisticated the likelihood of experiencing a “fresh” attack vector increases.  In response, we must work to close the time window between network compromise and exfiltration of critical data.  The best way to close this time gap between attack and data loss is to look closely at the traffic patterns on your network.  Of course, the problem most of you face is that you don’t have the time or resources to sift through billions of packets of data to find the needle in the haystack.  This is where NCA can help.

Our Security Analytics solution provides you with big data analytics without the big price tag.  By utilizing our service, we can take a snapshot of your network activity, and our experienced security analysts will quickly drill down on suspicious behavior.  We will provide a proactive view of your network that typically finds:

·         Undetected malware

·         Plain text passwords

·         Traffic going to risky nations like North Korea, Iran, and China

·         Communication to known botnet control networks

·         File transfers of organizations’ data to unauthorized sites

Our appliance is a non-obtrusive technology that plugs into a span port on a core switch and collects data for two weeks.  Once we collect and analyze the data, we will provide an executive summary of our findings and recommendations, and then completely wipe the data from the appliance.  We use technology from one the leaders in network security, RSA.