Sophisticated Security Intelligence Solution For Hidden Cyber Threats

Niara Unveils Sophisticated Security Intelligence Solution

A sophisticated new security intelligence solution, that combines forensics with advanced security data analytics, was launched by Californian-based Cyber security startup, Niara today.

The first of its kind, the Niara Security Intelligence Solution has been designed to give security teams an unparalleled view of security data from disparate sources, enabling them to uncover, investigate and quickly respond to hidden cyber threats within organizations. Built on big data architecture, it analyzes disparate data that identifies security weaknesses that often lead to multistage cyber attacks.

security-attacks

Announcing its one-of-a-kind product, Niara stated it was launching “from stealth,” and was immediately able to deliver the solution for “cloud, on-premise and hybrid deployment.” Prior to emerging from stealth, the company stated it has raised $29.4 million in capital for the project.

Business organizations increasingly find themselves under attack, and because of the sophisticated nature of these attacks, it usually takes months to detect them. This, says Niara, is quite simply because the monitoring and response tools that are currently available do not give total access to the disparate data silos within organizations’ networks. This, in turn, results in “inadequate visibility into an organization’s threat exposure,” leaving it extremely vulnerable to compromise.

The problem, says Niara CEO Sriram Ramachandran, is that perimeter-based security systems are becoming increasingly porous in the face of the sophistication and growing number of threats.
Existing monitoring solutions are limited by scalability challenges and a reliance on rules-based approaches that do not work with unknown threats,” he told CloudTweaks. “Advanced threats are routinely discovered weeks or months after the initial infection, and incident response capabilities are limited. Although many enterprises have made large investments to bolster their security posture, they are drowning in alert white noise with limited investigation context.”

In fact, according to a recent report released by the Ponemon Institute, on average it takes retail organizations more than six months to discover advanced threats to their businesses, and financial services firms (which generally spend more on cyber security tools annually), more than three months.

Key Findings Among Financial Services Firms

Advanced Threats

  • 71 percent view technologies that provide intelligence about networks and traffic as most promising at stopping or minimizing advance threats during the seven phases of the Kill Chain
  • 45 percent have implemented incident response procedures
  • 43 percent have established threat sharing with other companies or Government entities

DDoS Attacks

  • 55 percent consider DDoS attacks as an advanced threat
  • 48 percent ‘Strongly Agree’ or ‘Agree’ that they are effective in containing DDoS attacks
  • 45 percent have established threat sharing with other companies or government entities to minimize or contain the impact of DDoS attacks

Key Findings Among Retail Firms

Advanced Threats

  • 64 percent view technologies that provide intelligence about networks and traffic as most promising at stopping or minimizing advance threats during the seven phases of the Kill Chain
  • 34 percent have implemented incident response procedures
  • 17 percent have established threat sharing with other companies or government entities

DDoS Attacks

  • 50 percent consider DDoS attacks as an advanced threat
  • 39 percent firms ‘Strongly Agree’ or ‘Agree’ that they are effective in containing DDoS attacks
  • 13 percent have established threat sharing with other companies or government entities to minimize or contain the impact of DDoS attacks

Niara’s Security Intelligence Solution addresses all of these challenges by combining data from disparate data sources and converging advanced analytics and forensics techniques to enable the discovery and investigation of advanced threats, said Ramachandran.

User Behavior Analytics (UBA) is emerging as an integral piece of the security intelligence puzzle, but its scope must be expanded to include network flows and packets – not just logs. An enterprise must also understand device and application behavior to get the most comprehensive view of its risk posture – the Niara Security Intelligence Solution calls this an entity profile, and takes a broader view of all these requirements, rather than focus on just one aspect.”

The new Niara Security Intelligence Solution takes a holistic approach to solving sophisticated cyber threats. It does this by integrating “deep forensics” with both behavioral and raw, data-level analytics to enable the discovery and identification of “malicious insiders.” It also enables security teams to uncover threats and other incidents quickly and more easily. It does this by:
Operating on the full range of disparate data sources to uncover risky behaviors and threats that typically remain undetected when only log-based analytics are used.

Taking an entity-centric view of all possible threats, monitoring devices, applications, and users, to provide security teams with an in-depth overview of the organization’s risk posture.
Providing a comprehensive, analytical forensic trail with one-click access, thus simplifying and accelerating incident investigation and threat discovery.

Leveraging data stores without needing to duplicate or recreate them. Niara is backed by NEA, Index Ventures, and Venrock.

By Penny Swift

Frank Suglia
Managing Data Sprawl Over the last two years, our world experienced a dramatic acceleration of digital transformation. The COVID-19 pandemic upended normal operations for many businesses and shifted the pace of technology adoption into warp ...
Shireesh Thota
Here’s How to Position Your Organization for the Era of Data Intensity We live in a data-intensive era. Data is booming. Companies are realizing that data is one of the most important assets and they ...
Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...
Bitcoin electricity
Bitcoin Heating? Bitcoin mining or cryptocurrency mining has been widely vilified for it’s environmental impact. Why it does draw a huge amount of energy, more and more of it is coming from renewable sources and ...
Rakesh Soni
Businesses now see the cloud as a standard, and they are always on a hunt for ways to leverage the cloud to its full potential. And if enterprises need to be competitive in the ever-expanding ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.