Jazz Networks, an award-winning cybersecurity platform, announces that its newest release makes it the first of its kind to enable fully-customizable insider threat detection and response. Built to support the entire timeline of an attack, operators can now simultaneously detect unknown threats from unsupervised machine learning, known threats from its new policy engine, and automate their response actions for data-in-motion.
Recently recognized as the winner of a US Cyber Command competition, Jazz Networks continues to stand out from other top cybersecurity vendors by providing a mix of the most needed capabilities. Unlike most DLP technologies, the Jazz Platform is not restricted to solely reporting on policy violations. It continuously captures all endpoint and server events to provide a full-picture when an issue arises, versus limited violation data. Similarly with UBA vendors, while many provide a detailed view into employee behavior, they often don’t support real-time actions to respond to detected threats.
The platform’s new policy engine enables operators to leverage out-of-the-box policy packs based on typical insider threat indicators. New policy groups can also be created in just seconds, with customization to suit the customer’s IT policies and security needs. For more technical teams, the policies are comprised of python code snippets that can be extended without requiring any upgrades to the platform.
“Our policy engine is basically the Phantom Cyber for endpoints. This level of customization enables operators to fully control the response to any endpoint event based on the needs of the business,” said Hani Mustafa, CEO of Jazz Networks. “Most customers are able to use the out-of-the-box configuration to start, but the ability to fine-tune the policies in real-time allows them to pivot quickly without losing momentum.”
A popular use case for the new policy engine is employee education, where instant pop-up notifications are displayed on-screen for any user activity that goes against security policies. For example, if an employee uploads a document that contains “Company Confidential” on a browser, they would be instantly notified as to why it’s against corporate policy. These customizable notifications associate an explanation with an event as it happens, allowing companies to automate workforce security training with minimal effort.
“The cyber security fight requires every employee to understand that their actions make a difference,” said Steven Johnstone, CSO of Jazz Networks. “Slides in a meeting room won’t cut it anymore; real-time information delivered – based on actual threats – is key in increasing the effectiveness of security awareness programs.”