Eliminate Targeted Attacks, Insider Abuse and Malware

LightCyber™ behavioral analytics from Palo Alto Networks® empowers you to stop active attackers and malware operating inside your network. LightCyber prevents data breaches by learning the expected behavior of users and devices and then detecting behavioral anomalies indicative of attack. After LightCyber detects a network attack, it interrogates the attack source to determine which endpoint process initiated the attack and then analyzes that process in the cloud to identify malware, allowing your security analysts to swiftly confirm and shut down threats.


Streamline Analysis With Rich Investigative Data

 

LightCyber cuts through the noise of security alerts to find the threats that matter. It builds a comprehensive model of user and device behavior with over 1,000 learned behavior dimensions to find anomalous activity. When alerts are fired, LightCyber provides detailed investigative information related to the alerted behavior, including the source process, user credentials, domain and other information to help security teams detect and remediate threats.


Catch Attackers at Any Stage of the Attack Lifecycle

LightCyber prevents cyberattacks from compromised users and devices across the attack lifecycle. Designed by cyberwarfare experts, LightCyber detects network-based attacker behaviors that attackers cannot conceal and links them to the endpoint process, whether malicious or benign, that was used in an attack.

LightCyber prevents the following threats:

  • Command and Control: LightCyber detects and stops repeated access to rarely accessed sites, tunneled connections, domain generation algorithms, and access to known and unknown C2 servers.
  • Reconnaissance: LightCyber identifies abnormal network scans, connection failures and darknet scans.
  • Lateral Movement: LightCyber uncovers new admin behavior, credential misuse and credential scraping.
  • Data Exfiltration: LightCyber detects irregular, large and suspicious data transfers.
  • Malware: LightCyber interrogates endpoints to find malware, riskware and suspicious artifacts

Confirm Attacks With Endpoint Analysis

To add valuable insight to network alerts, LightCyber Pathfinder can analyze Windows® and Linux systems to determine which executables generated suspicious traffic. Once identified, the LightCyber Cloud Expert System can detonate suspicious files in a virtual sandbox and examine them using virus scanning engines to determine if they are malicious. With LightCyber Pathfinder, security teams can verify attacks and find malware on endpoints without needing to install bulky endpoint agents.


Use Machine Learning to Pinpoint Threats

Machine learning empowers organizations to prevent internal network attacks, including attacks that do not involve known exploits or malware. By performing unsupervised machine learning with the right inputs and detection algorithms, LightCyber can detect the anomalies and behavioral changes indicative of an attack. LightCyber combines powerful network-based machine learning technology with agentless endpoint inspection and cloud intelligence to automatically detect and eliminate critical risks in the network.


Shut Down Cyberattacks Instantly

Detecting attacks is great; stopping them is even better. By integrating with Palo Alto Networks next-generation firewalls, security analysts can isolate compromised devices from the network with one click. Alternatively, administrators can disable user accounts in Active Directory® or terminate malicious endpoint processes from the LightCyber console. For automated remediation, LightCyber integrates with leading IT process automation systems. Eliminating network threats quickly has never been easier.


Zero In on the Most Critical Security Issues

LightCyber from Palo Alto Networks mitigates targeted attacks, malware, insider threats and risky behavior while avoiding burdensome manual configuration or requiring hefty logging and storage demands. With LightCyber, organizations can detect and stop attackers early, before data is compromised.

  • Accuracy
    Take advantage of incredibly accurate security alerts. Over 61 percent of all LightCyber alerts and 99 percent of confirmed alerts are investigated, remediated, or deemed useful based on how customers disposition alerts.
  • Operational Efficiency
    Leverage machine learning to automate attack analysis and drive down security alerts to a manageable volume – approximately one alert per 1,000 hosts per day on average.
  • Coverage Prevent
    threats originating from laptops, IoT devices and mobile devices, as well as servers in the data center and the cloud, with network and agentless endpoint analysis.
  • Integrated Remediation
    Quarantine malicious users and hosts by integrating with the Palo Alto Networks next-generation firewall, Microsoft® Active Directory or Network Access Control systems to disable user accounts or isolate devices. Alternatively, LightCyber Pathfinder can directly terminate malicious processes on compromised devices.

LightCyber Behavioral Analytics

LightCyber Behavioral Analytics
LightCyber closes the gap in breach detection by detecting attack behaviors and enabling security analysts to rapidly – or automatically – mitigate attacks. Download the datasheet to view LightCyber’s benefits and technical specifications.
View now >

Experience LightCyber for Yourself
Let us show you how you can find attackers in your network that your existing security solutions are missing. Request a live demo to learn how you can gain visibility into malicious activity in your network with LightCyber from Palo Alto Networks.
Request Demo>


Recommended

Next-Generation Firewall Management from Tuffin- Webinar & Demo

Please join, Michael Hamelin - Tufin Chief Security Architect and Mike Schuricht - Palo Alto Networks Product Manager, to learn more about Tufin's comprehensive firewall management and auditing solution - specifically tailored to next-generation firewalls.

  • 494

Business Case for Next-Generation Firewalls - Video

Using a Palo Alto Networks next-generation firewall, your security team can strike an appropriate balance between blocking all personal-use applications and allowing them. Secure application enablement begins with first knowing exactly which applications are being used and by whom. This knowledge is then effectively translated into positive control model firewall policies that extend beyond traditional 'allow or deny.' The final component in our solution is giving you the ability to securely enable applications without degrading your firewall's performance.

  • 2292

Defeat APTs and Improve Your Security Posture in Real-Time

Level the playing field by using next generation security technologies from Palo Alto Networks and Splunk. Watch this webinar to learn new innovations that will help you detect and defeat cyberthreats in real-time, perform incident investigations faster, reduce costs, and improve your overall security and compliance posture.

  • 1000

Migrating from Cisco ASA to Palo Alto Networks

Watch this webinar to learn how easy it is to move to a next-generation security platform. Our product experts and Consulting Services team will explain the fundamental differences between Cisco ASA and Palo Alto Networks and share migration best practices, examples and case studies.

  • 2327

Transform Network Security With the Software Defined Data Center

VMware and Palo Alto Networks have partnered to deliver a solution that combines fast provisioning of network and security services with next-generation security in the data center.

  • 769

Traps PCI Compliance - Compensating Controls for Increased Security and Prevention of Advanced Threats

The theft of credit card data continues to grow at an alarming rate. Not only is it costly to credit card companies and merchants, but it undermines consumer confidence. In response, the Payment Card Industry has developed the PCI Data Security Standard (PCI DSS), which includes 12 requirements for protecting cardholder data. Despite substantial investments made in securing their networks, organizations are realizing that being PCI compliant does not mean an enterprise is protected against advanced cyberattacks.

  • 256