Aorato's solution profiles, learns, and predicts entities' behaviors enabling context aware real-time decision making against cyber attacks.
Cyber security start-up Aorato Ltd. has raised $10 million from Accel Partners, Eric Schmidt's Innovation Endeavors , and Glilot Capital Partners , and private investors Mickey Boodaei, a co-founder of Imperva Inc. (NYSE: IMPV) and Trusteer, and Rakesh Loonkar, another Trusteer co-founder.
Aorato was founded by CEO Idan Plotnik, VP R&D Michael Dolinsky, and VP professional services Ohad Plotnik, all of whom served in the IDF cyber security unit, and have a decade of experience in the field. The company says that its product is "the first context-aware, behavior-based Directory Services Application Firewall (DAF). The company's solution profiles, then not only learns, but also predicts entities' behaviors enabling context aware real-time decision making."
"The timing could not be more appropriate to launch Aorato into the cyber security market. 2013 showed the world the risks of advanced threats in parallel to the implications of insiders' access to sensitive corporate data. Both proved the need for a technology like Aorato to make a difference within the enterprise security posture," said Plotnik.
Aorato's approach is to focus on Microsoft's active directory services activities by observing the network traffic between active directory servers and the active network users and devices. The technology uses the interactions identified in this traffic to create its trademarked Organizational Security Graph (OSG), a model of the observed relationships over time. Aorato monitors active directory traffic, comparing activities against the OSG model looking for anomalies that could represent attack behavior or security policy violations, such as clear text/simple passwords, active directory protocol violations, or deleted/disabled users /computers activities. The DAF alerts on suspicious activities inserting them into an attack timeline, providing security experts with the means to identify the steps in the attack chain from the seemingly harmless individual events.
Published by Globes [online], Israel business news - www.globes-online.com - on January 21, 2014
© Copyright of Globes Publisher Itonut (1983) Ltd. 2014
You comment was recieved and soon will be published.
Thank you for posting your comment, which will be reviewed for publication.
Load more comments