Story image

Endace targets DDOS-backed security breaches

02 Jun 2016

​​Network monitoring firm Endace is targeting DDOS security breaches, launching its EndaceProbe 8100 Series Network Protectors.

DDOS attacks are often used to camouflage simultaneous attack activity, such as malware installation or data exfiltration. According to the company, these attacks can overwhelm monitoring systems, flooding them with so much traffic that they fail completely under the load, or generate so many alerts it becomes impossible to see what other concurrent activity may be taking place.

The new 8100 Series can capture and store network traffic at a sustained rate of 40 gigabits per second and is designed to provide ultra-high-speed monitoring and recording for the forensic investigation of network security breaches and performance issues.

The high-performance 8100 Series EndaceProbes not only support sustained 40Gbps recording, but also allow multiple users to data mine and analyse that traffic at the same time, Endace says.

This ensures security teams can continue to access and investigate recorded traffic- even during events such as DDOS attacks when their other monitoring systems may be overwhelmed.

“It’s essential to ensure your network monitoring and recording infrastructure can record without loss, even under the heavy of loads you would experience during a DDOS attack,” explains Stuart Wilson, CEO of Endace.

“Being able to reconstruct even the smallest aspect of an attack vector, exactly when you most need it – under heavy DDOS attack - is critical for effective breach analysis and legal audit trail creation,” he says.

Wilson says the new 8100 Series is the first product on the market advanced enough to record traffic from high-speed 40/100GbE networks without loss.

“It can capture traffic at high speed without losing packets, and can write captured data to disk at speeds sufficient to cope with high traffic loads,” he says.

Wilson says multiple EndaceProbes can be connected to form a centrally managed, network-wide monitoring and recording fabric with distributed storage.

“EndaceVision, a browser-based application bundled with every EndaceProbe, provides centralised data mining and visualisation for investigating security and network performance events across an entire network,” he says.

Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."