Masergy Empowers the detection and response mission with integrated network visibility tool
September 2017 by Marc Jacob
New Capability Enables Effective Alerting, Investigation and Incident Response
Masergy, a provider of global software defined networking, managed security and cloud communications solutions, today announced the release of its new Network Visibility Tool. Bundled with the Masergy Managed Detection and Response service, the new tool leverages Netflow data, Active Directory, geolocation, syslog, BGP and other metadata to gain deep network insight for the purpose of identifying and investigating malicious activity across the entire IT infrastructure.
Deployed with the company’s Unified Enterprise Security (UES) platform, the Masergy Network Visibility Tool can be configured to alert the security team to suspicious activity, such as unusual connections hitting critical information assets. The launch also includes a new Session Monitoring Tool widget for dashboard tracking of high-risk network sessions and latest security alerts, incidents and tickets.
Additionally the Masergy Network Visibility Tool allows customers to:
• Support Threat Hunting and other investigations on infected systems.
• Deploy rules for identifying malicious connections to critical assets.
• Execute Threat Intelligence matching on network traffic retrospectively.
• Identify problems with security controls and firewall rules so they can be fixed.