Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:00 PM
Dark Reading
Dark Reading
Products and Releases

Seculert Provides New Attack Visibility Dashboard for CISOs

New Executive Dashboard provides details on active attacks and benchmarks performance against industry peers

Santa Clara, Calif. – October 8, 2015 – Seculert, a leader in automated attack detection and analytics, today announced a new attack visibility dashboard that is designed to uniquely meet the needs of CISOs facing unrelenting attacks on their enterprise networks. With its new Executive Dashboard for CISOs, the Seculert platform provides a dynamic view into attack trends and provides a comparative view on how they are performing compared with similar companies.

“Seculert’s new Executive Dashboard makes it easy for CISOs to explain to their Boards the current attack trends within their company and how the company is performing relative to peers. It is also an key vehicle for the CISO to establish accountability, visibility and driving funding discussions with the Board,” said Richard Greene, Seculert CEO. “CISOs need a clear and timely view into how security teams are performing remediating current generation attacks.”

The Seculert Attack Detection Platform analyzes hundreds of terabytes of log data each week created during all stages of the attack lifecycle to provide CISOs the most accurate insight into their security posture. Combining contextual attack intelligence with a supervised machine learning analytics engine, Seculert’s cloud platform scales across domains, geographies and operating environments to automatically identify compromised users and devices, without impacting existing on-premise security tools or requiring additional security resources.

With the new Executive Dashboard, Seculert provides visibility into:

·       Active Malware & Leaked Data: Seculert provides a snapshot of the volume of the malware detected on infected systems, including how much has been allowed to communicate to command and control systems, and the average length of time infections persist before they are contained. Seculert also shows how much data has been successfully exfiltrated from the organization.

·       Breach Analysis: Seculert shows new and ongoing infections over time by identifying the number of assets attempting malicious communications each day. It also shows how many malware incidents are active, contained or blocked.

·       Incident Response Benchmarks: Seculert benchmarks a company’s incident response performance – including its rate of infection and the length of time it takes to remediate infections - against similar companies. It also benchmarks the performance of a company’s existing prevention technologies against the performance of other secure web gateway.

 “In today’s growing threat landscape, it was critical for us to have a sophisticated, automated solution in place that we can count on. Seculert’s platform has allowed us to significantly reduce the cost and amount of time it takes for us to analyze potential attacks, while also providing verified insight into our systems and web gateways,” said Richard Rushing, Motorola Mobility CISO. “With Seculert, we can compare how we’re doing against other companies in the industry, providing our executives with crucial visibility into security performance and risk.”

The Seculert Attack Detection Platform currently protects over 1.2 million enterprise users, analyzes over 200 terabytes of log data each week and monitors over 1.3 billion user communications each day. The latest release of the platform with Executive Dashboard is available now. 

Online Resources:

·       Go to the Seculert website to learn more information about the Seculert Attack Detection Platform

·       Please contact +1-408-560-3400 (or +44-203-355-6444 in the UK) to learn more about functionality and pricing


About Seculert  

Seculert is a leader in automated attack detection and analytics. Delivered via the cloud, the Seculert Attack Detection Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network, revealing exactly which devices and users are compromised. For the first time, CISOs can measure and prove the effectiveness of their existing threat prevention systems, all without deploying additional staff, hardware or software. Organizations worldwide use Seculert to identify known and unknown security threats, while enhancing the effectiveness of their IT security investments. Founded in 2010, Seculert has offices in the U.S., the U.K., and Israel. For more information, visit www.seculert.com.




Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...