CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people. The TSG CyGlass Cloud uses AI to continuously analyse the billions of conversations happening on your network, learn what is normal, and alert when suspicious behaviours that risk the security of your critical IT assets are detected. Your private data stays private, as the CyGlass Cloud doesn’t require any personally identifiable information to detect threats.
What is Network Defence as a Service (NDaaS)
Network Defence as a Service (NDaaS) is designed to be part of an organisation’s layered security architecture. As such, it has the ability to integrate with all other surrounding security technologies, including SEIM, EDR, network access control (NAC), network performance monitoring and diagnostics (NPMD), and security orchestration, automation, and response (SOAR). To prove compliance with relevant audit and regulatory requirements, companies want reports that prove they are monitoring their networks. Because NDaaS is provided through the cloud, rather than via a physical security appliance, companies do not face the long-term costs of appliance deployment and maintenance.
CyGlass provides a critical layer of defence behind the firewall to detect anomalies and threats that can lurk in your network for weeks, months, or even years before executing a devastating attack.
- Unauthorised VPNs created for the purpose of exfiltration
- Tampered firewall policies
- Rogue machines – machines running in an unknown subnet
- Data traffic to prohibited countries (North Korea, Iran, etc.)
- Network Dark Spots – network misconfiguration increasing the risk of an attack going undetected
- Retired asset suddenly becoming active
- Unauthorised use of company IT resources
- Suspicious after-hours traffic These types of activities are common to a wide range of attacks, including ransomware, Bitcoin mining, cybercriminal hacking attempts, and malicious insiders.
Benefits of CyGlass Include
- Deploys in Minutes
- Discovers Network Assets
- Learns Network Behaviours
- Alerts On Policy Violations
- Detects Threats Behind the Firewall
- Measures Network Risk and Progress Over Time