Oakley Intros Solution
Oakley Networks announced the immediate availability of CoreView, the company's network-based behavioral analysis solution
SALT LAKE CITY, Utah -- Oakley Networks, Inc., the leader in integrated solutions for insider threat detection and prevention, today announced the immediate availability of CoreView™, the company’s network-based behavioral analysis solution. With the addition of CoreView to its product suite, Oakley Networks is the first vendor to integrate network monitoring capabilities on top of a proven host-based solution already deployed by Fortune 1000 companies and leading government organizations (Oakley Networks SureView™).
“A combined, integrated solution that covers both network traffic and discrete desktop activity is the only way to fully mitigate insider threats,” said Tom Scocca, Investigator-Global Security consultant for Applied Materials. “Applied Materials is a global organization with 14,000 employees developing nanomanufacturing technology that helps produce virtually every semiconductor chip and flat panel display in the world, so it’s vital that intellectual property is protected whether it’s at rest, in motion, or even in use. Oakley Networks delivers the total solution.”
The CoreView solution is a turnkey appliance that can sit either at the network perimeter or monitoring interdepartmental traffic, depending on the customer need, and covers all network insider threat channels including data egress points, internal transactions, web and P2P communication, confidential document movement and VPN connections. The appliance continuously monitors traffic at the packet level, including payload analysis, and includes all TCP protocols, both inbound and outbound.
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024