Security Visibility Use Cases
Magna Use Cases
LightCyber Magna is a Behavioral Attack Detection platform that provides accurate and efficient security visibility into attacks that have circumvented traditional security controls.
Magna delivers value to customers of any size by providing accurate and efficient Security Visibility into attacks that have circumvented traditional security controls.
Security Visibility Encompasses 4 Key Use Cases:
No matter the location or sophistication of malware prevention tools, malware continues to make its way into corporate networks. By augmenting customers’ existing signature and sandbox-based prevention systems with behavioral profiling, Magna quickly identifies the anomalous network traffic generated by malware, isolates anomalous processes on the endpoint, and automatically provides up-to-date threat intelligence on the files. These are presented for immediate remediation.
Employees are motivated to get work done, not to worry about whether their actions are creating risk for their employer. That’s the security analyst’s job, but with legacy tools it’s very hard to identify these behaviors and discern whether they are benign and malicious. Magna makes it easier by automatically monitoring employee behavior and identifying anomalies that are attack or risk relevant.
Unfortunately, sometimes employees, partners, or trusted insiders intentionally cross the line. With the credentials and access they have, or can easily obtain, they can cause massive damage if not detected. And since they will rarely utilize malware or other attacker tools that might set off alarms, swift detection can be a challenge with legacy tools. That is where Magna comes it. Magna can quickly alert on the anomalous attack behaviors associated with the changes in behavior that occur when insiders go rogue.
We live in a world where both employee personal identifiable data and access to enterprise hosts are sold readily on the Dark Web. With these tools, a sophisticated attacker can wreak havoc on your network. But, what really separates targeted attacks from more opportunistic threats is the attackers’ ability and willingness to dwell in, learn, and exploit our networks. This strength becomes their weakness when Magna is in place. Such behaviors are immediately apparent as anomalies, even though they have been invisible to traditional prevention and detection tools.