Endpoint modeling: A new look at IT security

Today's realities such as end-to-end encryption, device proliferation, and increasing attacker sophistication call for a new approach to securing our networks

1 2 Page 2
Page 2 of 2

A growing number of customers deploy Observable Networks into AWS environments, where the setup takes only a few minutes (thanks to Amazon’s VPC Flow Logs service). The service works out of the box, so there's no major time commitment required of your staff. Each customer has a dedicated Observable Networks Web portal through which they gain visibility into their environment, manage alerts, and perform forensic investigation. Even our largest customers see no more than a handful of alerts per week under normal conditions. That may sound shocking, but endpoint modeling actually produces alerts in proportion to the number of genuine security incidents.

Patrick Crowley is founder and CTO of Observable Networks. He is also professor of Computer Science and Engineering at Washington University in St. Louis.

New Tech Forum provides a venue to explore and discuss emerging enterprise technology in unprecedented depth and breadth. The selection is subjective, based on our pick of the technologies we believe to be important and of greatest interest to InfoWorld readers. InfoWorld does not accept marketing collateral for publication and reserves the right to edit all contributed content. Send all inquiries to newtechforum@infoworld.com.

Copyright © 2016 IDG Communications, Inc.

1 2 Page 2
Page 2 of 2
How to choose a low-code development platform