NETSCOUT Omnis Cyber Intelligence joins hands with AWS security hub

News Desk -

Share

NETSCOUT SYSTEMS, INC. announced that Amazon Web Services, Inc. (AWS) customers will now have added visibility and security when migrating workloads to AWS using NETSCOUT’s Omnis Cyber Intelligence (OCI) integration with AWS Security Hub.

” As organizations migrate workloads to the cloud, their infrastructure becomes increasingly complex, making end-through-end visibility a necessity to uncover increased attack surfaces and combat threat exposure ,” said Russ Currie, vice president, enterprise strategy, NETSCOUT.

He added,  “As an AWS Validated Technology and Public Sector Partner with Network and Migration competencies, we’ve been in lock-step development with AWS. We’re excited that customers can realize the benefits of NETSCOUT OCI, which is now fully integrated onto AWS Security Hub.”

Built on the core of the industry’s most prominent network monitoring and packet recording and analysis technologies, NETSCOUT OCI is the industry’s quickest and most scalable network security software solution. It is the only solution that detects and examines suspicious activity in real-time and retrospectively, identifies risks early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets.

AWS Security Hub provides automatic, ongoing security best practice checks against AWS services, aggregates alerts and enables automated remediation as a cloud security posture management solution.

The connection between NETSCOUT OCI and AWS Security Hub improves the corporate security posture by enhancing the breadth and depth of cyberthreat visibility and information. Because NETSCOUT OCI automatically formats violations in the Amazon Security Findings Format (ASFF) and has built-in intelligence to suppress duplicate alarms and classify them as appropriate, the integration is easy. Through its interaction with AWS Security Hub, NETSCOUT OCI assists in the detection, investigation, and response to potentially malicious activities, exposing dangers associated with hybrid cloud interdependencies.