Oakley Intros Solution
Oakley Networks announced the immediate availability of CoreView, the company's network-based behavioral analysis solution
SALT LAKE CITY, Utah -- Oakley Networks, Inc., the leader in integrated solutions for insider threat detection and prevention, today announced the immediate availability of CoreView™, the company’s network-based behavioral analysis solution. With the addition of CoreView to its product suite, Oakley Networks is the first vendor to integrate network monitoring capabilities on top of a proven host-based solution already deployed by Fortune 1000 companies and leading government organizations (Oakley Networks SureView™).
“A combined, integrated solution that covers both network traffic and discrete desktop activity is the only way to fully mitigate insider threats,” said Tom Scocca, Investigator-Global Security consultant for Applied Materials. “Applied Materials is a global organization with 14,000 employees developing nanomanufacturing technology that helps produce virtually every semiconductor chip and flat panel display in the world, so it’s vital that intellectual property is protected whether it’s at rest, in motion, or even in use. Oakley Networks delivers the total solution.”
The CoreView solution is a turnkey appliance that can sit either at the network perimeter or monitoring interdepartmental traffic, depending on the customer need, and covers all network insider threat channels including data egress points, internal transactions, web and P2P communication, confidential document movement and VPN connections. The appliance continuously monitors traffic at the packet level, including payload analysis, and includes all TCP protocols, both inbound and outbound.
About the Author(s)
You May Also Like
Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024