1. Home
  2. >
  3. Security
  4. >
  5. Extended Threat Detection & Response

EXTENDED THREAT DETECTION AND RESPONSE

HIGH QUALITY DATA AND UNIQUE INSIGHTS FOR SUPERIOR ANOMALY DETECTION

With increasingly distributed networks, many organizations have adopted Zero Trust Network Access (ZTNA) solutions to strengthen security and reduce their attack surface. This is an important step forward, but a zero-trust posture still cannot provide 100% protection against advanced threats, especially those developed by nation-state actors and sophisticated criminal rings.

For these types of advanced threats, many enterprises are complementing ZTNA and other security solutions with Extended Threat Detection and Response (XDR) systems. XDR systems use behavioral analytics to detect anomalous patterns indicative of an advanced attack. This behavioral analysis is performed on large volumes of enterprise-wide user, device and network traffic data, with rules for actions to be taken to mitigate potential attacks.

The results of this analysis and the effectiveness of the XDR system depend on the information that is made available to it. The more accurate and precise the data fed to the XDR system, the more reliable and successful the detection of the threats.

ENEA QOSMOS TECHNOLOGY: THE DATA FOUNDATION FOR XDR

Enea Qosmos technology identifies 3600 protocols and applications

Identifies 3600 protocols and applications

Enea Qosmos technology furnishes 5600 types of metadata

Delivers 5600 types of metadata

Enea Qosmos technology classifies encrypted and evasive traffic

Classifies encrypted and evasive traffic

Enea Qosmos technology surfaces anomalous behaviors

Indicates anomalous behaviors

ENEA QOSMOS TECHNOLOGY INSIDE XDR

XDR comprises two main functions: Network Detection & Response (NDR) and Endpoint Detection & Response (EDR). As the names suggest, the main role of NDR is to detect and prevent intrusion of the network as a whole, while the goal of EDR is to stop intrusion at the endpoint (e.g., through anti-virus solutions). Both NDR and EDR use a combination of trusted technologies: 1. Intrusion Detection/Intrusion Prevention Systems (IDS/IPS) for NDR and 2. Endpoint Protection (EPP) for EDR to detect primarily known threats, and 3. machine-learning enhanced behavioral analyses based on Advanced Anomaly Detection (AAD) to identify unknown or hidden threats that have evaded these systems.

Enea Qosmos technology not only identifies and classifies network traffic, but also provides highly detailed and accurate information on each flow. It is used as a data foundation to support AAD in both NDR and EDR, and to enhance existing rule-based detection capabilities within IDS and EPP components.

XDR = NDR + EDR

ENEA QOSMOS: GRANULAR INSIGHTS FOR XDR

Enea’s Qosmos ixEngine® software delivers the data that fuels advanced analytics within XDR solutions. It passively and non-intrusively inspects and analyzes raw telemetry data (rather than logs) to provide detailed, highly accurate data about the protocols, applications, services, users, files, flow characteristics and devices associated with traffic flows.

  • In Endpoint Protection (EPP), Qosmos ixEngine supports better rule-based threat detection by delivering important contextual data including SSO credentials, device ID or profile, location, time, and application risk posture.
  • In Advanced Anomaly Detection (ADD), data from Qosmos ixEngine is used to:
    1. Build reliable models of normal behavior to detect future anomalies
    2. Accurately determine which abnormalities represent threats
    3. Rapidly qualify these threats and IPS alerts using contextual
    4. Develop effective rules in response to these assessments
  • In Suricata IDS/IPS, Qosmos ixEngine enables the development of expanded whitelists and blacklists, safeguards visibility with classification of encrypted traffic, reduces false positive alerts, and significantly improves Suricata’s ability to detect anomalous and evasive traffic. Learn more about how to boost Suricata IDS/IPS performance
  • For the XDR platform as a whole, the contextual metadata provided by Qosmos ixEngine makes threat analysis and forensics much faster and easier (while simultaneously reducing the need for full packet capture).

GLOBAL NETWORK VISIBILITY

  • Gain real-time L2-to-L7 traffic visibility across diverse environments: mobile and cloud networks, on-premise equipment, IoT devices, applications and containers.
  • Identify and classify encrypted traffic without decryption through fine grained and contextualized metadata and statistics.
  • Leverage protocols, metadata, behavioral baselining and analytics to surface new, hard-to-detect threats moving laterally across a network.

CRITICAL EFFICIENCY

  • Save valuable SOC staff time (and frustration) by excluding low- or no-value data and better qualifying and funneling alerts.
  • Dramatically reduce data storage requirements by excluding safe traffic and reducing the need for full packet capture to support forensics.

DEPLOYMENT AGILITY

  • Deploy as an SDK, CNF, VNF (Qosmos ixEngine) or Software Sensor (Qosmos Probe) to adapt to continuously evolving network environments.
  • Gain the speed and flexibility needed to secure and manage forthcoming 5G mobile networks.

INDUSTRY RECOGNITION

 

Qosmos ixEngine wins Gold in the 2022 Cybersecurity Excellence Awards
Qosmos ixEngine wins the Editor’s Choice award for Embedded Security in the Global InfoSec Awards for 2021
Qosmos Probe for Advanced Network Detection & Response Solutions
Network Detection and Response – Survey Report by Cybersecurity Insiders
Improve Suricata’s Ability to Detect Threats in Evolving Networks with Enea Qosmos Traffic Intelligence
Webinar
On-Demand: How to Use Network Detection & Response (NDR) to Mitigate the Inevitable Breach