ipoque, a Rohde & Schwarz company, says that Orsec Technologies has licensed its DPI engine R&SPACE 2 for its cyber threat hunting solution oorigin. Providing accurate traffic analytics and a rich set of metadata in real time, R&SPACE 2 strengthens Orsec’s threat hunting capabilities.
This allows for more accurate alerts, faster threat detection and enhanced machine learning.
Cyber-attacks have become a constant threat to governments and enterprises. In 2019 there was, so far, no day without a major data leak or data destruction. While larger companies and governments can afford a dedicated team of experts or expensive security tools, small and medium companies are more vulnerable.
However, in today’s highly connected IT ecosystems, if security is not established for all companies, there will be no protection at all.
oorigin is a next-generation intelligence solution that enables small and medium sized organisations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.
According to Jean-Luc Rouinvy, CTO and founder of Orsec Technologies, “many cyber-attacks remain undetected for up to ten months and can cost companies millions of euros.” oorigin empowers IT administrators to proactively search for malware or attackers lurking in the network, discover shadow IT and reduce investigation time after a cyber-incident.
“With R&SPACE 2, Orsec takes advantage of a DPI solution that can analyse 100% of the traffic in real-time without performance loss. Through its weekly protocol and application signature updates R&SPACE 2 empowers oorigin to classify an extensive range of protocols and applications. With the provided metadata, devices, servers and virtual machines can be identified. This way, Orsec is able to offer a proactive, intelligence-driven IT security solution to prevent and disrupt threats”, says Jean-Luc Rouinvy.
“Moreover, the metadata extracted from traffic flows by R&SPACE 2 provides a rich information feed that can be used to boost our machine learning for user and device behaviour analytics, strengthening our threat analytics and providing priceless information for post cyber incident investigation,” he added.