rvlsoft - Fotolia

Awake Security adds adversarial model to security platform

The new feature is meant to enable companies to identify attackers faster. Other updates to the security system include extending cloud capabilities to Amazon Web Services.

Awake Security has updated its platform to add several new features, including adversarial modeling and autonomous triage and response.

According to Awake, attacks can be challenging to identify because attackers use insider privileges and avoid malware. The new adversarial modeling function was designed to give security teams the ability to identify attackers based on intent, rather than requiring them to search for indicators of an attack. Adversarial modeling conducts a multidimensional analysis that looks at factors including time, entities and protocols to better identify attackers. The platform is continuously updated to add adversarial models in an effort to help organizations keep up with new and evolving attacks.

More updates from Awake

Other new features introduced in the update were designed to enable security analysts to do their jobs more easily and effectively, according to Awake. Updates to the company's security system, Ava, include autonomous triage and response, new third-party integrations that aim to simplify and speed up workflow, extended support for cloud environments and improved user experience.

According to Awake, autonomous triage and response reduces the manual work effort required by the security teams and makes it possible for analysts of all skill levels to use the product.

Ava tracks weak signals of threats, but also looks for other signals to confirm a detection. It uses Awake's knowledge of each user, device and entity on a network to do this in order to give security teams only high-level alerts that require action.

Awake's capabilities also now extend to the cloud, and both Awake Sensors and Awake Nucleus can be deployed on Amazon Web Services. The integration provides cloud-native support for advanced detections, autonomous threat hunting and triage capabilities. It provides organizations with the ability to understand threats and treat incidents with a unified view.

Monitoring network traffic continues to become more common. In August, Gurucul launched its Network Behavior Analytics product, which similarly uses machine learning to identify threats. Gurucul's tool identifies and monitors unusual behavior from any entity on a network.

Dig Deeper on Threat detection and response

Enterprise Desktop
Cloud Computing