Progressive threat detection guards against attacks from anonymous networks

Insider threat

Cyber attackers use a variety of anonymity techniques to avoid detection. Many attacks come from anonymous proxies and anonymity networks are often use valid, but compromised, credentials.

Access control specialist SecureAuth is launching a new Threat Service product to stop suspicious logins even if attackers have valid credentials and even if they are logging in from an anonymous network.

SecureAuth Threat Service combines multiple information feeds to protect against today's multifaceted threat landscape including Advanced Persistent Threats (APT), as well as cyber crime and hacktivism. It uses accurate IP geo-location data to map all routable IP addresses worldwide.

It enhances a customer’s ability to identify compromised credentials before allowing access by determining whether an authentication request is coming from a known bad IP address or an anonymous network. It can therefore reduce response times by cutting through the noise and identifying compromised accounts for IT staff and incident response teams. Depending on the risk identified, SecureAuth can require multi-factor authentication to verify identity, can deny the request outright, or can simply pass the user on to their destination.

"While many companies may have some form of threat service in use today, these services are often times not linked to whether or not somebody with valid credentials coming from a known suspicious origin are allowed to access critical organizational resources," says Stephen Cox, chief security architect at SecureAuth. "Recognizing the value behind actionable, contextual data as a critical risk factor in an adaptive access solution, SecureAuth Threat Service uses threat information to cover a wide spectrum of attacks, irrespective of their motivation. As a result, organizations can thwart in-process attacks and prevent them from becoming the next headline".

You can find out more on the SecureAuth website or register for a live webinar taking place on June 29.

Image Credit: Andrea Danti/Shutterstock

Comments are closed.

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.