Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Case Studies: Real World Incidents Detected and Stopped by Awake

Jan 08, 2019

Now that security tools that have become proficient at identifying noisy, malware-based attacks, cyber criminals have adapted to using non-malware techniques in a majority of breaches. They rely on tools that already exist within the environment, abusing insider credentials or using SSL tunnels to legitimate sites for command and control. Attackers are also targeting the ever-growing population of non-traditional devices on the network, devices that often lack the same level of security controls. This means that security teams must now detect malicious intent that blends with business-justified activity, a task that is both tedious and challenging for most analysts.

The Awake Security Platform is powered by the real-world expertise of the world's foremost investigators. It applies artificial intelligence to bring these human skills to all customers, instantly analyzing billions of communications to discover every device, user and application on the network. Through autonomous hunting and investigation, Awake then detects malicious intent from insiders and external attackers alike. With exhaustive intelligence from the network, Awake uniquely identifies mal-intent to stop credential abuse, data exfiltration, and much more.

Organizations across industries use Awake every day to identify and stop modern threats from both internal and external actors with various malicious objectives. The following pages outline real-world examples where Awake was used to detect and stop interesting and sophisticated threats.


Whitepaper