Showing posts with label Narus. Show all posts
Showing posts with label Narus. Show all posts

Tuesday, July 15, 2014

Narus and Politecnico di Torino Open Cyber Innovation Center

Narus and the Politecnico di Torino have opened a new Cyber Innovation Center on the campus of this prestigious engineering university.

The new center will focus on advanced cybersecurity research projects and prototyping of technologies that help identify and resolve cyber threats. Leveraging the expertise of local talent, the new center will also foster advanced science, technology, engineering and math (STEM) education while generating new technologies that will be integrated into Narus products.

“Narus has a long history innovating in the area of cybersecurity through its fellows program, which has included leading global universities like the Politecnico di Torino for five years. These partnerships have resulted in a number of joint patents and technologies that are incorporated into Narus products,” said John Trobough, president, Narus. "Expanding the program by funding research effort in Europe opens up a large pool of talented people here as we enhance collaboration between nations on both sides of the Atlantic.”

http://www.narus.com

Tuesday, February 25, 2014

Blueprint Column: Five Big Themes at RSA 2014

by John Trobough, president at Narus

Now that RSA is underway I wanted to take some time to cover five key themes being talked about at the event.

Machine Learning

Machine Learning is at the top of my list.  As the frequency of attacks, the sophistication of the intrusions, and the number of new networked applications increase, analysts cannot keep up with the volume, velocity, and variety of data.

The use of machine learning is gaining critical mass fueled by the bring your own device (BYOD) and Internet of Things (IOT) trends. This technology can crunch large data sets, adapt with experience, and quickly generate insight or derive meaning from the data. With machine assistance, analysts spend less time on data-processing duties, and focus more time on problem solving and defense bolstering activities. Machine learning brings new insights to network activity and malicious behavior, and is accelerating the time to resolve cyber threats.

Data Visualization

The historic and rudimentary approach of taking tabular data and presenting it in colorful pie charts and graphs does not deliver insight. According to ESG research, 44 percent of organizations classify their current security data collection as “big data” and another 44 percent expect to classify their data collection and analysis as “big data” within the next two years.  With the explosive growth of volume and variety of data, analysts are experiencing cognitive overload. Their brains cannot process information fast enough. The challenge is to display insight and conclusions from data analysis in a clear way to facilitate rapid response.

Symbolic representations, like visual threat fingerprints, will be required for quick interpretation and comparison before diving into details. Data visualization design will need to incorporate best practices including:
Context-aware controls, that appear only when required
Seamless integration, providing flow from one task to the next without assumed knowledge about the source of the data
Human factor principles, to display data, analysis, and controls in ways that enhance clarity and usability.

Context

According to Gartner, the use of context-aware security helps security technologies become more accurate and enhance usability and adoption in response to cyber threats.

If we define context as the information required to answer the questions “what,” “how” and “why,” context will provide the understanding needed to better assess the threats and resolve them faster.

The advancements made in data visualization enable organizations to determine when something isn’t right on their network. Context takes this further by allowing organizations to determine what their network activity is supposed to look like and how data visualization and context fit together.

Internet of Things (IoT)

Connected devices have become a hot and desirable trend. ABI Research estimates there will be more than 30 billion wirelessly connected devices by 2020. This machine-to-machine (M2M) conversation offers new opportunities for innovation, generates a plethora of new data streams and also creates new threat vectors.

Today, there is a desire for deeper connectivity in the workplace and home. For the business, IoT provides a range of benefits, from increasing operational efficiency to better managing resources and expanding existing business models.  As for the consumer, IoT assists with safety, health, everyday planning and more.

However, all this connectivity compounds security challenges. It’s one thing for your refrigerator to tell you you’re out of milk, but it’s quite another for hackers to use refrigerators to access your network and steal your data or initiate attacks on other networks.

Consumerization of Security

It’s no longer just about the impact that weak security has on the enterprise but also how it is affecting consumers. More and more people are producing and storing their own data and creating their own private clouds, but are still in the dark about how to properly protect it.

According to cybersecurity expert Peter W. Singer, it’s not just weak passwords, such as “password” and “123456” that cybercriminals are after. Usually, cybercriminals are after the ability to change a password with information acquired from public records (i.e. mother’s maiden name). With sophisticated threats looming all over the web, it’s only a matter of time before most consumers are faced with a stiff test on protecting their digital assets.

As consumers become more conscious of security and privacy issues, they will want to know how to prevent their identity from being stolen with just a click of a mouse. Many consumers will turn to the vendors, including retail and banking, for answers, and many vendors will turn to security providers.

Our Opportunities and Challenges

The security landscape faces a future of tremendous growth. More than ever, security is underlying all business practices. In a digital economy where connected devices are everything, security is critical and cannot be an afterthought. Security is not something that you layer on. Instead we should assume we will face a threat and be prepared to respond. While there will be many conversations happening at RSA on a multitude of other security topics, you can be sure these five themes will be heard loud and clear.

About the Author



John Trobough is president of Narus, Inc., a subsidiary of The Boeing Company (NYSE: BA).  Trobough previously was president of Teleca USA, a leading supplier of software services to the mobile device communications industry and one of the largest global Android commercialization partners in the Open Handset Alliance (OHA). He also held executive positions at Openwave Systems, Sylantro Systems, AT&T and Qwest Communications.







About the Company


Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. And because Narus solutions are scalable and deployable to any network configuration or business process, Narus boosts the ROI from existing IT investments. Narus is a U.S.-based company, incorporated in Delaware and headquartered in Sunnyvale, Calif. (U.S.A.), with regional offices around the world.

Narus Accelerates Cyber Threat Assessment for Enterprises

Narus introduced new tools to accelerate the time it takes for enterprise security teams to resolve cyber threats.  Once network administrators suspect an attack, current practices can take days or weeks to isolate the breach and understand its implications.

The next generation of the Narus nSystem enables organizations to build “zero trust” networks and take a proactive approach to cybersecurity.

The system provides visibility, advance warning and data modeling to help teams understand and make informed security decisions quickly. It can identify over half a million applications (including mobile)and deliver visualizations to put the observed activity in context.

“Enterprises with cloud, mobile and big data initiatives know that security remains their biggest risk and roadblock to success,” said John Trobough, president, Narus. “Narus is experienced in equipping security teams with the necessary tools to help protect and maximize return on their existing IT investments. We enable enterprises to shift their security posture from being defensive and reactionary to being proactive. Powered by the innovation in machine learning and cognitive research, Narus nSystem greatly enriches context and visibility, allowing enterprises to speed up response time and adopt a proactive approach to cybersecurity.”

http://www.narus.com

Wednesday, August 14, 2013

Narus Appoints Sr. VP of Product Management

Narus, a leader in big data analytics for cybersecurity, appointed Mohan Sadashiva as senior vice president of product management. Sadashiva most recently served as vice president and general manager of the cloud services broker business unit at Intel Corporation, through the acquisition of Aepona.
Prior to Intel, Sadashiva was the senior vice president of marketing at Synchronoss, where he managed marketing, business development, products and the patent portfolio. His experience also includes serving as vice president of products at Trimble, where he was responsible for a $100 million on-demand field force solution. Sadashiva has held leadership positions at Openwave Systems, Schlumberger and Nortel.

http://www.narus.com

Wednesday, May 8, 2013

Narus Hires Oracle Exec to Head Global Sales


Narus, which specializes in big data analytics for cybersecurity solutions, named Joe Eskew as head of global sales.

Eskew comes to Narus from Oracle, where he served as vice president of worldwide sales for the virtual desktop infrastructure global business unit. Previously, he held executive-level sales positions with Citrix Systems, Inxight Software and Network Associates.

http://www.narus.com

Monday, February 25, 2013

Narus: Time to Out Innovate Cyber Attackers with Cyber 3.0

Narus, which develops big data analytics for cyber security, is setting its sights on Cyber 3.0 -- a new approach to cyber security whereby machine learning serves as the foundation of next-generation security products that protects devices, organizations and people.

Narus, which is a Silicon Valley-based subsidiary of Boeing, said a new approach to cyber security is made possible by the semantic web.  Instead of just reacting to new cyber security attacks, the industry must leverage the power of the predictive web to get ahead of the threat and out-innovate the adversaries.

The company defines Cyber 3.0 as "the intersection of the semantic Web and cyber." Because of the massive volume of data, the new security framework relies on machine-to-machine learning that enables the collection, extraction, fusion, analysis and connection of information. Ultimately, it provides the visibility, control and context required to protect organizations in today's environment. Cyber 3.0 will be the foundation for a future in which machines drive decision-making.

Narus has filed or been awarded 32 patents related to cyber security. The company is announcing the following products at this week's RSA Conference in San Francisco.

  • Narus nSystem: New big data analytics solution leverages machine learning and automated continuous learning to achieve incisive intelligence for protection of critical assets. The system processes 100 percent of network packets to discover, analyze and understand every cyber interaction, and deliver the visibility, control and context required. The result is the Narus nSystem, which can scan millions of pieces of data and metadata; aggregate data about users, communities, devices and applications; and then delve into the traffic as well as the content behind network behavior. Narus said its solution ensures that every interaction is contextualized to help users draw conclusions about patterns and relationships. And semantic analysis provides clear insight into details about location, demographics, topics, interests, roles, personal information, relationships and more. Users can then discover unknown relationships and contextualize all interactions to gain incisive intelligence based on learned relationships, and predict threats and protect critical assets.
  • Narus Application Whitelisting Technology: A breakthrough application classification technology that automates the formerly manual process of generating application signatures, and identifies them in real time. This new technology replaces any human intervention in the reverse-engineering process. Patented algorithms automatically identify the presence of unknown applications and generate their corresponding signatures and labels in seconds.
  • Narus N10: Cloud-based information security software that provides complete document control using a secure, cloud-based environment, proprietary encryption, and rigorous authentication and authorization.
"Narus is a pioneer in cyber security and Cyber 3.0, having put new ideas and concepts into practice to keep pace with the constant evolution of the cyber world," said John Trobough, president, Narus. "Armed with innovative and patented technology, revolutionary new solutions, and strategic partnerships, Narus will continue to help the world's organizations protect their critical assets in this increasingly hyper-connected world.”

http://www.narus.com


Thursday, January 31, 2013

Narus Names John Trobough as President


Narus, a provider of big data analytics for cyber security, named John Trobough as its new president. Trobough previously was president of Teleca USA, a leading supplier of software services to the mobile device communications industry and one of the largest global Android commercialization partners in the Open Handset Alliance (OHA). He also held executive positions at Openwave Systems, Sylantro Systems, AT&T and Qwest Communications.

Narus, which is a subsidiary of Boeing, is based in Sunnyvale, California.

"The Narus team is exceptionally innovative and passionately dedicated to delivering the next generation of cybersecurity software with a focus on Cyber 3.0, where the semantic Web and cyber intersect," said Trobough.

http://www.narus.com

See also