This news is classified in: Defense Cyber Defense / IT
Sep 10, 2014
General Dynamics Fidelis Cybersecurity Solutions has enriched its network security analytics solution, Fidelis XPS ™ Collector , with new capabilities that enable security analysts to more quickly detect and remediate threats. Fidelis XPS Collector's real-time, automated application of threat intelligence to current and historical metadata provides the information necessary to identify and react to malicious traffic, reducing the time from infiltration to remediation. Designed to deliver the context required to understand events taking place on the network, Fidelis XPS Collector stores historical network memory that is necessary in proactive event detection, incident response and historical analysis, accelerating the detection and remediation of malicious activity.
Fidelis XPS Collector enables analysts to pivot from an alert to root cause determination with only a few clicks. By providing rich, content-infused metadata in near real time, the enhanced Fidelis XPS Collector removes the complexity of analyzing and correlating historical data, while reducing the time to discovery and containment.
Facts
Forecasts by Deployment Mode (Cloud-based, On-premise), by Component (Hardware, Software, Services), by End-user (Army, Navy, Air Force, Cyber Commands), by Security Type (Network Security, Endpoint Security, Application Security, Cloud-based Security, Data Security), by Solutions (Threat Intelligence and Response Management, Identity and Access Management (IAM), Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM), Firewall, Other) AND Regional and Leading National Market Analysis PLUS Analysis of Leading Companies AND COVID-19 Impact and Recovery Pattern Analysis
Download free sample pagesAccording to Tom Lyons, vice president of product management for General Dynamics Fidelis Cybersecurity Solutions, "The early detection of threats is crucial to successful discovery, containment and remediation. By providing advanced visualization and correlation capabilities, we're making it much easier for analysts to determine the root cause of an attack, hunt down the threat actor in their network and fully understand the relationships between indicators of compromise and potential threats – helping customers identify malicious traffic faster and take action sooner."