aeonik security fabric - lookingglass cyber...ae ecurity abric page 2 lookingglass is a leader in...

2
SECURITY WOVEN INTO YOUR NETWORK Aeonik’s soſtware-based framework combines network traffic analysis, behavior and signature-based detecon, threat intelligence, and advanced threat response delivering coordinated detecon and migaon at line rate. This approach allows for dynamic detecon and response to malicious behavior across the enre enterprise the first me it is seen anywhere on the network. This orchestraon within zones pushes responses throughout the fabric, so no maer where the event is detected, the appropriate response will occur everywhere deemed applicable. NOT JUST INTEGRATION, BUT INTEROPERABILITY Built on open standards and protocols including OpenFlow and STIX 2.1, Aeonik supports current and future security investments. Aeonik also comes “out of the box” with pre-built integraons for leading SIEMs, Threat Intelligence ingeson, and other common elements of the security stack using formats like Common Event Format (CEF) and Log Event Extended Format (LEEF). Aeonik is the answer to the evolving soſtware-defined, borderless network environment, reducing the need for custom integraons and offering standards-based interoperability. GO BEYOND SIMPLE BLOCK, DROP, AND QUARANTINE. DEFEND, CONFUSE, DECEIVE, AND DELAY ATTACKS AT THE MOST APPROPRIATE PHASE OF THE KILL CHAIN COMPREHENSIVE VISIBILITY INTO COMMUNICATIONS ACROSS ON-PREMISES, PUBLIC CLOUD AND HYBRID ENVIRONMENTS DYNAMICALLY DEFEND YOUR NETWORK USING BEHAVIORAL AND SIGNATURE BASED DETECTIONS THE ULTIMATE SOLUTION FOR DEFENDING YOUR ENTERPRISE NETWORK The LookingGlass ® Aeonik Security Fabric is a next-generaon Intrusion Detecon and Prevenon System (IDPS) providing comprehensive visibility and advanced threat response for complete and effecve defense across your enterprise network. Aeonik illuminates all areas of the environment to quickly idenfy, hunt, disrupt, and respond to adversary acvies at the moment and point of aack. A soſtware-based soluon that requires no specialized hardware, Aeonik’s framework allows for flexible deployment - whether on-premise, cloud, or hybrid - and in as many locaons as desired. DATA SHEET PAGE 1 © 2020 LookingGlass Cyber Solutions, Inc. All rights reserved. AEONIK SECURITY FABRIC

Upload: others

Post on 16-Jul-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AEONIK SECURITY FABRIC - LookingGlass Cyber...Ae ecurity abric PAGE 2 LookingGlass is a leader in intelligence-driven risk mitigation, including global attack surface monitoring, threat

SECURITY WOVEN INTO YOUR NETWORK

Aeonik’s software-based framework combines network traffic analysis, behavior and signature-based detection, threat intelligence, and advanced threat response delivering coordinated detection and mitigation at line rate.This approach allows for dynamic detection and response to malicious behavior across the entire enterprise the first time it is seen anywhere on the network. This orchestration within zones pushes responses throughout the fabric, so no matter where the event is detected, the appropriate response will occur everywhere deemed applicable.

NOT JUST INTEGRATION, BUT INTEROPERABILITY

Built on open standards and protocols including OpenFlow and STIX 2.1, Aeonik supports current and future security investments. Aeonik also comes “out of the box” with pre-built integrations for leading SIEMs, Threat Intelligence ingestion, and other common elements of the security stack using formats like Common Event Format (CEF) and Log Event Extended Format (LEEF). Aeonik is the answer to the evolving software-defined, borderless network environment, reducing the need for custom integrations and offering standards-based interoperability.

GO BEYOND SIMPLE BLOCK, DROP, AND QUARANTINE. DEFEND, CONFUSE, DECEIVE, AND DELAY ATTACKS AT THE MOST APPROPRIATE PHASE OF THE KILL CHAIN

COMPREHENSIVE VISIBILITY INTO

COMMUNICATIONS ACROSS ON-PREMISES,

PUBLIC CLOUD AND HYBRID ENVIRONMENTS

DYNAMICALLY DEFEND YOUR NETWORK USING BEHAVIORAL AND SIGNATURE BASED DETECTIONS

THE ULTIMATE SOLUTION FOR DEFENDING YOUR ENTERPRISE NETWORK

The LookingGlass® Aeonik Security Fabric is a next-generation Intrusion Detection and Prevention System (IDPS) providing comprehensive visibility and advanced threat response for complete and effective defense across your enterprise network. Aeonik illuminates all areas of the environment to quickly identify, hunt, disrupt, and respond to adversary activities at the moment and point of attack. A software-based solution that requires no specialized hardware, Aeonik’s framework allows for flexible deployment - whether on-premise, cloud, or hybrid - and in as many locations as desired.

DATA SHEET

PAGE 1© 2020 LookingGlass Cyber Solutions, Inc. All rights reserved.

AEONIK™ SECURITY FABRIC

Page 2: AEONIK SECURITY FABRIC - LookingGlass Cyber...Ae ecurity abric PAGE 2 LookingGlass is a leader in intelligence-driven risk mitigation, including global attack surface monitoring, threat

Ae o n i k S e c u r i t y Fa b r i c

PAGE 2

LookingGlass is a leader in intelligence-driven risk mitigation, including global attack surface monitoring, threat modeling, and network defense. Our full-service portfolio integrates threat intelligence, analysis, and a robust set of tools to operationalize threat mitigation in the network.

© 2020 LookingGlass Cyber Solutions, Inc. All rights reserved.

With standard and custom solutions, LookingGlass makes cyber security smart and seamless for governments and enterprises.

Learn more at http://www.LookingGlassCyber.com

ABOUT LOOKINGGLASSCYBER SOLUTIONS

KEY ADVANTAGES

SHAPE THE ADVERSARY’S EXPERIENCE

Aeonik offers the option of stealth deployment, with no Layer 2 (MAC) or Layer 3 (IP) address, which makes Aeonik’s presence completely invisible to potential adversaries, who can neither hack nor circumvent defenses they don’t know are there.

Aeonik also takes automated, inline response far beyond the basics of “block or allow.” Powerful advanced threat response options including transparent rerouting and redirecting suspicious traffic, as well as deceiving, delaying and controlling the adversary’s experience enables defenders to respond with the mitigation in the location(s) best suited to repel or manipulate the attack.

Comprehensive network visibility

Simplify the security stack

Scalable inline mitigation Scale cost-effectively even as line rates and traffic volumes grow

Enable and increase the value of deception technologies

Disruptive pricing model based on Gpbs (no penalty for redundancy)

Native LookingGlass Cyber Threat Intelligence & third party integration

Coordinated detection & automated response