Responsive image

The Challenge: Things aren't getting better

Despite years of code-centric, signature-based, and kernel-level methods of detecting and stopping IT Security attacks, the following statements are more true than ever:

Responsive image

Zero Trust Monitoring: Instant Impact → Continuous Improvement

The concept of Zero Trust represents a dramatic shift in the way organizations will secure their environments, and offers the promise of vastly improving IT security for its adopters. Regrettably, the ideals of Zero Trust, while desirable, remain unattainable given the current level of IT security visibility, instrumentation, and the toolsets available to customers today.

Notably, one of the most promising aspects of Zero Trust is microsegmentation. At present, microsegmentation is only deployed in data centers because current solutions cannot scale to protect an entire network but with Sensilla’s microsegment monitoring, organizations can model and monitor the system as though microsegmentation had been deployed to the entire network.

Sensilla takes a practical approach to this challenge with the introduction of Micro-segment Management (MsM). MsM allows the IT security professional to model and visualize the network as though microsegmentation has been deployed to the entire network and enables a new level of network threat assessment and attack detection.

Continuously monitoring the network cartography as though Micro-segmentation was fully deployed allows Sensilla to alert the IT Security team of new, or notable, changes in the IT Security system. The detection of lateral movement within the network is critical to detecting the expansion of an attack and the escalation of privileges that attackers seek as they attempt to gain a foothold and expand their visibility and access privileges within the organization.

Modern Network Collaboration

Network collaboration enables enterprises to unlock innovation and collaboration in ways that have not previously been possible. This level of collaboration is, however, achieved using a finite number of predictable and repeated connectivity patterns. These patterns can be modeled and leveraged as an alert system to detect changes in user relationships and application usage patterns.

Cartology vs. Topology

Where people are located, and how they connect, is largely irrelevant in today's networks. People utilize network services from multiple devices via different media in a very fluid way. As a result, a system that can understand the Cartology of enterprise networks provides a more useful foundation for an IT Security system.

Horizontal | Lateral Movement

A Critical element to mapping the network cartography is the ability to differentiate between expected vertical, and unexpected horizontal, communications. Lateral movement is a compelling sign of an attacker exploring the system for weak points and, once identified, for expanding their footprint and/or escalating thier permissions.

Responsive image

Applications for Zero Trust Monitoring

Sensilla gathers a vast array of data to assemble the network cartography. This data has a number of uses in the context of the overall IT Security System.

Lateral Movement Detection
Lateral Movement Detection

Sensilla continuously monitors the IT system as though Micro-segmentation was fully deployed and alerts the IT Security team of new, or notable, changes in the connectivity matrix. The detection of lateral movement within the network is critical to detecting the expansion of an attack from a single host and to detecting the escalation of privileges that attackers seek as they attempt to gain a foothold and expand their visibility and access privileges within the organization.

Incident Response
Incident Response

When a security incident occurs, one of the most important elements of succesfully repairing the system and restoring service is to have compete visbility into network communications. Being able to see traffic traversing the firewall is fine, but being able to see the internal communications is far superior when you're searching for remnants of an attack that may still be proliferating despite the best efforts to contain it.

Cyber Hygiene
Cyber Hygiene

Complete visbility into network communications means you can see expected and unexpected network communications. This includes services and applications that were previously retired, may not be approved, or might fit into the category of 'it's always been done that way'. Identifying and remediating these legacy and/or unsupported systems will markedly reduce the attack surface when an attacker searches for the weak points in the IT security system.

Responsive image

Sensilla Services

The wealth of contextual information in the Sensilla data store allows the company to provide both proactive and reactive IT security services.

Continuous Monitoring

Sensilla continuously monitors the IT system as though Micro-segmentation was fully deployed and alerts the IT Security team of new, or notable, changes in the connectivity matrix. The detection of lateral movement within the network is critical to detecting the expansion of an attack from a single host and to detecting the escalation of privileges that attackers seek as they attempt to gain a foothold and expand their visibility and access privileges within the organization.

Threat Hunting

Patterns that change subletly over time can be compelling indicators of an attack, just as much as the spread of malware or the loss of credentials. Sensilla threat hunting services provide visibility into notable changes in the network cartography that are immediately apparent as well as those that are more diffcult to detect and may emerge over weeks and months.

Compliance Tracking

Network cartography lends itself directly to assessing the status of the IT system relative to compliance tracking initiatives. Highly sensitive environments such as PCI are continuously monitored and changes to the cartography in those sections of the network are immediately detected and reported. This is not dissimilar to monitoring and reporting performed for the entire enterprise, but it is simply a different view of the company's current IT Security status.

Responsive image

Instant Status | On-demand Reports

Microsegment monitoring provides Sensilla customers with instant system status and on-demand reporting

Industry Breach Peace of Mind

Quickly ascertain whether your organization is also susceptible to, or participating in, a breach effecting your industry peers.

On demand Vulnerability Report

Not prepared for a meeting? Quickly generate vulnerability, current status, and/or Active Directory security status reports.

One-Second Sanity Check

No need for endless dashboard surfing or digging through bottomless layers of data. Peek at Sensilla and be informed.

Responsive image

About Sensilla Inc.

Sensilla is a US based, privately held, company incorporated in 2018, and focused on helping customers prevent, contain, and solve IT security attacks that, to date, have been difficult or impossible to cure. The company leverages deep experience in IT security and enterprise networking to take a new approach to solving challenges that have existed for decades but haven’t been solved by the code-analysis-centric approach taken by the vast majority of IT security companies.

Responsive image
Responsive image

Contact

Sensilla, Inc.
USA
info@sensilla.cloud
@Sensilla_Inc
@Sensilla_Inc

Copyright Sensilla Inc. 2021