wonderfully unique software solutions

LiveAction network detection and response wins infosec innovation nod

Network intelligence vendor LiveAction Software has been recognised at this year’s RSA cybersecurity conference for its network threat detection and response technology.

Thomas Pore, senior product director at LiveAction, said the Global InfoSec innovation award from Cyber Defense Magazine “validated” the company’s scaleable multi-stage analysis pipeline to address more complex enterprise networks.

“Without decrypting or ‘breaking’ encrypted traffic, ThreatEye is unique in its use of real-time network analysis and AI to rapidly detect suspicious behaviour,” he said.

“Our deep packet dynamics (DPD) looks at more than 150 packet traits and creates a fingerprint of network flows for profiling and anomaly detection.”

The LiveAction offering was effective as part of a cybersecurity posture tackling threats across the network, including ransomware and threats that might be hidden in encrypted traffic, the vendor said.

Gary S Miliefsky, publisher at Cyber Defense Magazine, said LiveAction ThreatEye demonstrated an understanding of how to cost-effectively tackle future threats.

LiveAction was “innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach”, Miliefsky said.

Global InfoSec judges included certified IT security professionals based on “independent review” of vendor submissions to the competition programme. The entire list of 2023 Global InfoSec winners is here.

The LiveAction ThreatEye platform complements cloud network intelligence offerings LiveNX, LiveWire and Omnipeek, as well as LiveSP for services providers. to tackle hybrid, on-prem, edge and all-cloud environments.

According to the LiveAction announcement, the ThreatEye platform was recognised for its ability to help secure networks from core to edge to cloud, and to detect threat actors with its AI-driven behavioural analytics and automated multi-stage analysis.

ThreatEye creates a “historical inventory” of network traffic relationships, packet traits, encryption usage and characteristics for building asset connection fingerprints, establishing behavioural profiles, and intelligently discovering assets, without the need for decryption, the vendor said.

( Photo by Drew Dizzy Graham on Unsplash )

Recent Articles

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Top-25 cloud list runs gamut from Visma to Cloudflare, Wasabi to Azul

The Software Report market insights website has named 25 software companies as the top companies in cloud computing for 2024, offering specific...

TeamViewer partners Deloitte on digital visuals for warehouse logistics

Deloitte and TeamViewer have combined the latter's augmented reality (AR) based visual picking offering with SAP Extended Warehouse Management (EWM) for warehousing...

Hornetsecurity expands M365 cloud security offer with Vade deal

Cloud email security provider Hornetsecurity has added a partnership with Vade, increasing focus on answering data sovereignty requirements with best-in-class cloud, compliance...

Cross-browser testing provider BrowserStack named Microsoft ‘partner of choice’

Software testing platform provider BrowserStack has announced a strategic partnership with Microsoft to support Visual Studio App Center users transitioning to BrowserStack...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox