SlideShare a Scribd company logo
1 of 2
Download to read offline
Technology Alliance Partner I Solution Brief

Advanced Threat Protection Solution Delivering
Effective and Scalable Cyber Security
Net Optics and Light Cyber
The Challenge
The last couple of years demonstrated that traditional perimeter and endpoint
security solutions are not effective against targeted attacks.
Once a persistent attacker crosses the perimeter, he can operate freely inside
the internal network. It is therefore essential to monitor internal network traffic
at a large scale and automatically analyze it to detect the attackers’ malicious
behavior. Vital to this strategy is maintaining the scalability, availability,
performance, and value of these monitoring solutions.

The Solution

Solution Highlights
•	 Comprehensive detection of targeted attacks
without the use of signatures or rules
•	 Detection of malicious behavior as well as malware,
both known and unknown

Light Cyber and Net Optics have partnered to provide a scalable and faulttolerant solution, which consists of the Light Cyber Magna™ working with Net
Optics Tap solutions and xBalancer™.

•	 Easily install and scale deployments as needs grow
while lowering TCO

Net Optics iTap 2 Port Aggregator copies traffic from one network link to
one or two monitoring tools. It supports network-monitoring through an easyto-use Web UI, detailed counter statistics, SNMP traps, and field upgradable
software. If traffic levels exceed the capacity of the receiving NIC, the Port
Aggregator stores overflow traffic into buffer memory; if traffic exceeds 100%
bandwidth of the monitoring device, the device can function like a standard
tap with half duplex monitoring—and then be set back to resume full duplex
aggregation mode. Numerous features including Role Based User Access
(RBAC), 1024bit SSL encryption (for HTTPS and SSHv2), IP Access List, and
SNMPv2 / SNMPv3.

•	 Gain advanced threat protection without
compromising network reliability

The Net Optics xBalancer is built specifically to prevent tool overburdening
by distributing the traffic to multiple monitoring tools. Thus xBalancer
allows customers to scale their deployments as the need grows while
maintaining security. Tool health is monitored using Heartbeat packets
and can proactively redirect traffic to available or spare tools in case of
failure.
Light Cyber Magna™ detects malicious behavior of targeted attackers
inside the organization’s network. Automated analysis profiles the normal
behavior of network users and hosts to spot malicious activity at an early
stage of an attack. Targeted Forensics™ provides the incident response
team with the information they need to effectively investigate and
remediate the attack.

•	 Focuses the incident response team on the high
priority threats
•	 Targeted Forensics™ combines network and host
indicators to enable effective investigation and
remediation
Technology Alliance Partner I Solution Brief
Advanced Threat Protection Solution Delivering Effective and Scalable Cyber Security

Magna automates a
Router

Switch

2
1

2

OFF

B

1

A

Profile - MAGNA seamlessly profiles normal
behavior of all network users and endpoints
enterprise-wide, passively analyzing
network traffic with zero-configuration and
without any rules or signatures.

10 GigaBit

2

1

B

2

A

Monitor

Network

BYPASS
ON

1

B
A

three-step methodology

LINK

RESET

OUT

IN

OUT

IN

OU T IN

OU T IN

www.netoptics.com

Net Optics iTap™

Console
1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

Detect - MAGNA automatically detects
malicious behavior inside the organizational
network at the early stages of an attack and
alerts the SOC

24

Management

Net Optics xBalancer™

Light Cyber Magna

Light Cyber Magna

The diagram shows two network ports on the Net Optics iTap connected to the upstream
and downstream network devices, the aggregation ports connecting to the xBalancer. The
Light Cyber appliances connect to the xBalancer, which provides session based load balancing.
The xBalancer in turn uses a unique heartbeat for each Light Cyber monitoring link. In case of a
heartbeat failure the xBalancer rebalances the traffic to the remaining tools or to an additional
spare to maintain continuous monitoring.

Investigate - MAGNA uses Targeted
Forensics™ at the network and host level,
to provide the incident response team
with the information they need to quickly
understand the nature and severity of the
threat and to effectively investigate and
remediate the attack.

Net Optics

Light Cyber

Net Optics is the leading provider of Total Application and Network
Visibility solutions that deliver real-time network intelligence for
peak performance in network monitoring and security. As a result,
businesses achieve the scalable end-to-end visibility they need to
optimize network performance of physical, virtual and private cloud
environments, and remote branch offices. More than 7,500 enterprises,
service providers and government organizations—including 85
percent of the Fortune 100—trust Net Optics’ comprehensive plug and
play family of application-aware NPM, Network Packet Broker, Virtual/
Cloud and Visibility Management System (VMS) solutions to deliver
immediate results and quick time to value through an easy-to-use
interface. Net Optics maintains a global presence through leading OEM
partner and reseller networks.

Light Cyber is a leading provider of Advanced Threat
Protection solutions that automatically detect malicious
behavior of targeted attacks and unknown malware inside
the organization’s network. Their solutions allow the security
operation center (SOC) to focus on remediating actionable
incidents at an early stage of the attack, rather than manually
searching through large volumes of data to discover cyber
threats. Founded in 2011 by leading cyber security experts,
Light Cyber serves customers in industries from finance and
telecom to media and technology.

5303 Betsy Ross Drive
Santa Clara, CA 95054, United States
Main: +1 (408) 737-7777
www.netoptics.com

101 Hudson Street, Jersey City
New Jersey 07302, United States
Main: +1 (201) 984 1969
www.lightcyber.com

Net Optics® is a registered trademark of Net Optics, an Ixia company. Copyright 1996-2013 Net Optics, an Ixia company . All rights reserved. Additional company and product names may be trademarks or registered
trademarks of the individual companies and are respectfully acknowledged. Light Cyber and the Light Cyber logo are trademarks or registered trademarks of Light Cyber, Inc. in the United States and other countries.

More Related Content

More from LiveAction Next Generation Network Management Software

More from LiveAction Next Generation Network Management Software (18)

The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
 
Compliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized EnvironmentCompliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized Environment
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
 
Tapping Into the Health of Your Network
Tapping Into the Health of Your NetworkTapping Into the Health of Your Network
Tapping Into the Health of Your Network
 

Light Cyber - Advanced Threat Protection Solution Delivering Easy-to-use and Scalable Cyber Security

  • 1. Technology Alliance Partner I Solution Brief Advanced Threat Protection Solution Delivering Effective and Scalable Cyber Security Net Optics and Light Cyber The Challenge The last couple of years demonstrated that traditional perimeter and endpoint security solutions are not effective against targeted attacks. Once a persistent attacker crosses the perimeter, he can operate freely inside the internal network. It is therefore essential to monitor internal network traffic at a large scale and automatically analyze it to detect the attackers’ malicious behavior. Vital to this strategy is maintaining the scalability, availability, performance, and value of these monitoring solutions. The Solution Solution Highlights • Comprehensive detection of targeted attacks without the use of signatures or rules • Detection of malicious behavior as well as malware, both known and unknown Light Cyber and Net Optics have partnered to provide a scalable and faulttolerant solution, which consists of the Light Cyber Magna™ working with Net Optics Tap solutions and xBalancer™. • Easily install and scale deployments as needs grow while lowering TCO Net Optics iTap 2 Port Aggregator copies traffic from one network link to one or two monitoring tools. It supports network-monitoring through an easyto-use Web UI, detailed counter statistics, SNMP traps, and field upgradable software. If traffic levels exceed the capacity of the receiving NIC, the Port Aggregator stores overflow traffic into buffer memory; if traffic exceeds 100% bandwidth of the monitoring device, the device can function like a standard tap with half duplex monitoring—and then be set back to resume full duplex aggregation mode. Numerous features including Role Based User Access (RBAC), 1024bit SSL encryption (for HTTPS and SSHv2), IP Access List, and SNMPv2 / SNMPv3. • Gain advanced threat protection without compromising network reliability The Net Optics xBalancer is built specifically to prevent tool overburdening by distributing the traffic to multiple monitoring tools. Thus xBalancer allows customers to scale their deployments as the need grows while maintaining security. Tool health is monitored using Heartbeat packets and can proactively redirect traffic to available or spare tools in case of failure. Light Cyber Magna™ detects malicious behavior of targeted attackers inside the organization’s network. Automated analysis profiles the normal behavior of network users and hosts to spot malicious activity at an early stage of an attack. Targeted Forensics™ provides the incident response team with the information they need to effectively investigate and remediate the attack. • Focuses the incident response team on the high priority threats • Targeted Forensics™ combines network and host indicators to enable effective investigation and remediation
  • 2. Technology Alliance Partner I Solution Brief Advanced Threat Protection Solution Delivering Effective and Scalable Cyber Security Magna automates a Router Switch 2 1 2 OFF B 1 A Profile - MAGNA seamlessly profiles normal behavior of all network users and endpoints enterprise-wide, passively analyzing network traffic with zero-configuration and without any rules or signatures. 10 GigaBit 2 1 B 2 A Monitor Network BYPASS ON 1 B A three-step methodology LINK RESET OUT IN OUT IN OU T IN OU T IN www.netoptics.com Net Optics iTap™ Console 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Detect - MAGNA automatically detects malicious behavior inside the organizational network at the early stages of an attack and alerts the SOC 24 Management Net Optics xBalancer™ Light Cyber Magna Light Cyber Magna The diagram shows two network ports on the Net Optics iTap connected to the upstream and downstream network devices, the aggregation ports connecting to the xBalancer. The Light Cyber appliances connect to the xBalancer, which provides session based load balancing. The xBalancer in turn uses a unique heartbeat for each Light Cyber monitoring link. In case of a heartbeat failure the xBalancer rebalances the traffic to the remaining tools or to an additional spare to maintain continuous monitoring. Investigate - MAGNA uses Targeted Forensics™ at the network and host level, to provide the incident response team with the information they need to quickly understand the nature and severity of the threat and to effectively investigate and remediate the attack. Net Optics Light Cyber Net Optics is the leading provider of Total Application and Network Visibility solutions that deliver real-time network intelligence for peak performance in network monitoring and security. As a result, businesses achieve the scalable end-to-end visibility they need to optimize network performance of physical, virtual and private cloud environments, and remote branch offices. More than 7,500 enterprises, service providers and government organizations—including 85 percent of the Fortune 100—trust Net Optics’ comprehensive plug and play family of application-aware NPM, Network Packet Broker, Virtual/ Cloud and Visibility Management System (VMS) solutions to deliver immediate results and quick time to value through an easy-to-use interface. Net Optics maintains a global presence through leading OEM partner and reseller networks. Light Cyber is a leading provider of Advanced Threat Protection solutions that automatically detect malicious behavior of targeted attacks and unknown malware inside the organization’s network. Their solutions allow the security operation center (SOC) to focus on remediating actionable incidents at an early stage of the attack, rather than manually searching through large volumes of data to discover cyber threats. Founded in 2011 by leading cyber security experts, Light Cyber serves customers in industries from finance and telecom to media and technology. 5303 Betsy Ross Drive Santa Clara, CA 95054, United States Main: +1 (408) 737-7777 www.netoptics.com 101 Hudson Street, Jersey City New Jersey 07302, United States Main: +1 (201) 984 1969 www.lightcyber.com Net Optics® is a registered trademark of Net Optics, an Ixia company. Copyright 1996-2013 Net Optics, an Ixia company . All rights reserved. Additional company and product names may be trademarks or registered trademarks of the individual companies and are respectfully acknowledged. Light Cyber and the Light Cyber logo are trademarks or registered trademarks of Light Cyber, Inc. in the United States and other countries.