Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
High costs of IT personnel
Shortage of inhouse IT engineers
Values
Reduce Costs
Ensure Security and Business Continuity
Expanse Behavior
A complete, outside-in view of the behavior of your perimeter, its responsive assets, and their communication outside your organization
About Product
Description
The Solution
Expanse has developed a new way to approach problems by partnering with global Internet service providers to join observed Internet traffic data associated with your networks with our active sensing data. By unifying these types of data, our platform helps you have a comprehensive view of your assets and what they are talking to. This is a fundamental shift from the prior art, which was to leverage humans to scrutinize network traffic wherever local sensors were dropped. Behavior discovers, tracks, and notifies you of risky and policy-violating activity from your network, all without agents or instrumentation.Some Key Uses
Behavior detects communications to and from your Internet-connected assets that may indicate policy violations or potential compromise of an asset, including:- Connections to risky services like Tor or BitTorrent
- Connections to risky or prohibited geographies or countries, like those prohibited by the OFAC
- Use of problematic, risky, or prohibited software, like P2P sharing applications
- Known command-and-control traffic and communications with device types that are commonly compromised or used as command-and-control servers.
- Passively uncover suspicious or risky activity to and from assets on your network
- Validate whether security and access policies are being followed
- Identify assets communicating with Tor networks, command-and-control servers, and geographies that may be prohibited