STEX - 2016-ICT-Conference

Conference Video|Duration: 7:29
April 27, 2016
Please login to view this video.
  • Video details

    Startup Exchange Lightning Talks: Uplevel Security, Yaxa

    Uplevel Security Enterprises invest millions in preventing and detecting cyber attacks but have limited technology capabilities for responding to attacks. Their current security infrastructure applies sophisticated algorithms to network and endpoint data to identify potentially malicious activity. However, the output of these appliances is an alert - an isolated data point without any surrounding context. Incident responders need to go through a manual, time-consuming process to reconstruct the original context and understand how an alert relates to their historical data and external threat intelligence. Uplevel automates incident response by applying graph theory to the technical artifacts of cyberattacks. This allows organizations to reduce response times and increase the efficiency of their analysts, thereby reducing their overall exposure risk.

    Yaxa According to 2015 Verizon Data Breach Investigative Report (DBIR), 95% of the breaches happen due to stolen user credentials. When legitimate user’s login credentials gets stolen, imposters (malicious outsiders) using these stolen credentials pose as insiders. Yaxa’s in-line software appliance protects enterprise’s critical data center assets and web applications in real-time from such insider threats. Yaxa’s unique user data access fingerprint approach not only detects such bad users but also takes automatic enforcement action as per configured IT policy instead of generating an alert. Real-time imposter and malicious user detection, coupled with automatic enforcement results in huge savings in investigation time and cost reduction while improving risk posture for an organization.

Locked Interactive transcript
Please login to view this video.
  • Video details

    Startup Exchange Lightning Talks: Uplevel Security, Yaxa

    Uplevel Security Enterprises invest millions in preventing and detecting cyber attacks but have limited technology capabilities for responding to attacks. Their current security infrastructure applies sophisticated algorithms to network and endpoint data to identify potentially malicious activity. However, the output of these appliances is an alert - an isolated data point without any surrounding context. Incident responders need to go through a manual, time-consuming process to reconstruct the original context and understand how an alert relates to their historical data and external threat intelligence. Uplevel automates incident response by applying graph theory to the technical artifacts of cyberattacks. This allows organizations to reduce response times and increase the efficiency of their analysts, thereby reducing their overall exposure risk.

    Yaxa According to 2015 Verizon Data Breach Investigative Report (DBIR), 95% of the breaches happen due to stolen user credentials. When legitimate user’s login credentials gets stolen, imposters (malicious outsiders) using these stolen credentials pose as insiders. Yaxa’s in-line software appliance protects enterprise’s critical data center assets and web applications in real-time from such insider threats. Yaxa’s unique user data access fingerprint approach not only detects such bad users but also takes automatic enforcement action as per configured IT policy instead of generating an alert. Real-time imposter and malicious user detection, coupled with automatic enforcement results in huge savings in investigation time and cost reduction while improving risk posture for an organization.

Locked Interactive transcript