Threat Intelligence
6/7/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Balbix Launches Predictive Breach-Risk Platform

The company announces the general availability of its AI-based platform and reveals details of powerful outcomes achieved by design partners and early customers.

SAN JOSE, CA -  Balbix today announced its official launch and general availability of its products. Balbix has built the security industry's first predictive breach-risk platform. Created for CISOs and CIOs, the platform calculates and visualizes an enterprise's cyber-breach risk and resilience across all devices, users and apps in its extended network. This system can be used to predict top breach scenarios, prioritize security mitigations and provide risk insights to prevent security incidents before attacks happen. The company also announced that it has received $8.6 million in investor funding from Mayfield.

"Building cyber-resilience is key in the post-hacked world where it's a matter of when, not if, an enterprise is hacked as the attack surface has increased through the adoption of IoT devices, BYOD and the cloud," said Navin Chaddha, Mayfield Managing Partner and Balbix board member. "Balbix resolves the critical need of CISOs to get ahead of the adversary by enabling them to understand their cyber risk and act to limit the likelihood and impact of attacks. Gaurav has drawn upon his entrepreneurial and deep security expertise and assembled a world-class team that has delivered the industry's first predictive and prescriptive breach risk assessment platform. I look forward to the journey and watching Balbix grow into a leading cybersecurity player."

A number of security firsts
Balbix has built the market's first platform to use predictive analytics and AI to automatically measure breach risk and calculate resilience. Specialized sensors deployed across the enterprise continuously discover and monitor all devices, apps and users across hundreds of attack methods and indicators of business impact. This telemetry data is analyzed by advanced self-learning algorithms and used to build a bottom-up risk model. Within minutes of installing a few sensors, security teams can visualize their breach risk and use this to prioritize operations and projects.

Distinguishing industry-first features include:

  • Comprehensive risk heat-map: The system automatically monitors and analyzes the enterprise network 24/7/365 across hundreds of attack vectors to provide a real-time, searchable and clickable color-coded map of the enterprise. This helps over-burdened security teams prioritize mitigation projects by identifying areas of highest risk and surfacing actionable insights.
  • Predictive risk analytics: Balbix predicts breach scenarios by analyzing indicators of risk, factors that point to the future likelihood of occurrence of security incidents, e.g., user clickthrough behavior indicating high phishing risk. In contrast, existing products rely on indicators of attack or compromise based on security events that have already happened.
  • Effectiveness of mitigations and cyber-resilience: Balbix can compute the effectiveness of security mitigations already implemented and help prioritize planned security projects. The system also measures organizations' cyber-resilience -- the ability to limit the impact of security incidents. 

Risk management is a growing market -- and top-of-mind with the C-suite
The industry need for risk-management solutions, including analytics that predict the impact of business risk, is growing. According to a March 2017, Gartner report, "Definition: Integrated Risk Management Solutions," by John Wheeler, "Gartner also notes a shift to greater investment in risk-based approaches designed to respond more effectively to the growing cybersecurity and related digital business demands facing organizations today. With this shift in investment, Gartner forecasts that the IRM solution market will grow from $3.9 billion in 2015 to $7.3 billion by 2020, representing a compounded annual growth rate (CAGR) of 13.4 percent1." We feel these findings validate a recent survey conducted by Balbix, which included 600 participants, including 250 from the Fortune 500, in which nearly 100 percent of respondents expressed concern about the rapidly expanding attack surface, while 87 percent said they were worried about lateral movement by attackers.

Automate risk assessment to reduce costs
In addition to proactively identifying risk and thwarting attack spread, Balbix addresses the increasingly relevant issue of security spend versus value with its automated risk-measurement capability. Enterprises with 10,000 devices typically pay around $250,000 for two penetration tests (pen tests) a year2. Relying on pen testing to find vulnerabilities or validate compliance is not ideal because the state of the enterprise changes every day. Balbix significantly increases the ROI on enterprise spend by offering comprehensive and continuous risk measurements at annual costs comparable to or lower than a single pen test.

"Today, it is incumbent upon us to assess our risk environment and protect ourselves from advanced threats targeting new technologies and devices, so that we don't suffer a breach, lose our intellectual property or get hit with compliance penalties down the road," said Abe Smith, director of enterprise security at Cavium, Inc. "Balbix allows us to get ahead of our threat environment by proactively identifying the most significant sources of risk in our network and prioritizing those gaps for remediation, enabling us to tightly -- and accurately -- focus our security spending and reduce costs."

Focus on cyber-resilience
"By now it should be clear to anyone that attackers are able to routinely breach enterprises as environments become more complex and new threat vectors emerge constantly," said Anthony Belfiore, SVP and CSO of Aon, a leading global professional services firm. "It is imperative that businesses are able to fully understand and assess their organization's resilience against cyber-attacks, and the risk posture of their key third-party partners."

"Today, security teams are forced to rely on a set of reactive security tools, with no real way to predict how or where a breach is most likely to hit next," said Gaurav Banga, CEO and founder of Balbix. "It is very difficult for security practitioners to assess the true risk posture of an enterprise and communicate this to senior management or the board of directors. By automating predictive risk calculations and providing clear visualization, we let companies know what's most important, so they may channel their security spending where it's needed most. This is key to improving cyber-resilience." 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.