Highlights
- New security and Network Behavior Analytics feature added to ThreatIQ with ThreatGuard by Aviatrix.
- The new features put security directly into the cloud network and reduce the time to identify unknown threats.
Aviatrix, a pioneer of secure cloud networking, comes up with new security-based features for ThreatIQ with ThreatGuard. Aviatrix ThreatIQ offers continuous Network Behavior Analytics with new features built into the cloud network fabric.
The analytics are customized for every environment, including fingerprinting workload and traffic characteristics to form a baseline. It also supports improvements over time and complements signature-based threat defenses.
ThreatIQ with ThreatGuard inserts security across Aviatrix multi-cloud data plane and allows every network node to ensure security inspection and enforcement. Distributed threat visibility and control built natively within the network data plane identifies traffic to malicious destinations and securely allows policy-based automated remediation.
1. Working of ThreatIQ with ThreatGuard
The feature inspects traffic in real-time as it crosses the network and provides deeper visibility into activities that are usually missed by traditional network security approaches such as legacy solutions and Next Generation Firewall (NGFW). The policy-based automated remediation of identified threats removes manual administrative action and review delays.
Aviatrix authorized partners and public cloud marketplaces make the availability of ThreatIQ with ThreatGuard in zero or no time.
2. Benefit from Network Behavior Analytic
With this feature, network behavior analytics, including ThreatIQ, Aviatrix customers benefit from supreme security posture, resulting in less risk to security. In this case, security is built into the cloud network. The added benefit is the proactive approach reduces the time to detect unknown threats.
3. Cloud-centric approach to security
“Security challenges continue to evolve in the cloud, with increasingly porous exposure and no single perimeter,” said Bryan Ashley, Vice President of Product Marketing at Aviatrix. “Our customers are looking for multi-cloud native capabilities like Network Behavior Analytics to help secure their business-critical infrastructure and enhance their cloud security posture.”
4. Puts traditional solution to the back seat
The signature-based traditional solutions are not cloud-aware, reflecting only a single point of inspection, and function with a legacy operational model. The lack of visibility and control over critical business processes leaves enterprises vulnerable to unacceptable risks like data loss, exfiltration, or resource hijacking.
“Enterprises and government organizations alike are aware of how public cloud introduces entirely new risk vectors, however they continue to struggle with developing and operating an architecture to properly address this exposure,” said Yves Vazquez, Sr. Manager at Accenture Federal Services. “Aviatrix is focused on supporting our mutual government customers as they seek to enhance secure cloud networking architectures.”
- Infrastructure cost reduction for inspection and control
The IBM 2021 Cost of Data Breach Report mentions, “The average total cost of a data breach increased by nearly 10% year over year to USD 4.24 million), the largest single-year cost increase in the last seven years….Costs were 80% lower for organizations with a more mature security posture leveraging AI and automation (for security anomaly detection).”
The Network Behavior Analytics in ThreatIQ diminishes infrastructure costs while complementing existing security investments.
Experts’ view
“The priority for PACCAR’s cloud infrastructure team is to quickly respond to the dynamic needs of our business and our customers, supporting an evolving supply chain landscape while also delivering new global connected services to customers,” said Dallas Thornton, Director, Digital Services at PACCAR. “Aviatrix is a critical part of our architecture that enables us to deliver new business capabilities while layering in enhanced security natively into our multi-cloud networking infrastructure.”