Arista NDR Newsletter, July 2023

Page 1

Secure Networks, The Zero Trust Way

Network security needs to pivot from bolt-on reactive measures to a more proactive built-in approach of continuous contextual network monitoring that ensures a threat is detected before it can lead to a significant data breach.

Arista

Named a Leader in The Forrester Wave™: Network Analysis and Visibility, Q2 2023

Forrester Research has named Arista a leader in The Forrester Wave™: Network Analysis and Visibility (NAV), Q2 2023, which notes that “Arista Networks’ deployment flexibility is second to none.” As part of this analysis, Forrester included 13 top providers in the network detection and response space and evaluated them based on their current offering, strategy, and market presence.

www.arista.com/security

1

Arista was recognized in the report for a number of reasons, including:

● Under the Current Offering category, Arista received the highest possible score across Asset Discovery, Augmented Threat Analysis, Threat Hunting, and Product Security.

● Arista received more highest possible scores across both the Strategy and Current Offering criteria than any other provider.

● Among providers, Arista scored the highest in the Current Offering category and among the top three in the strategy category.

● In the Strategy category, Arista received the highest possible scores in the criteria of Vision, Innovation, Adoption, and Pricing Flexibility and Transparency.

● Our ability to ”embrace the unknown or nonstandard elements to provide greater visibility into an otherwise murky quagmire of disparate IoT/OT networks.”

● Arista’s autonomous virtual assist (AVA), an AI-driven security decision support system that “provides deep insight into associated details of an event with minimal input from the analyst required.”

2 www.arista.com/security

Download this highly anticipated report to understand whom to consider and how to evaluate NAV/NDR providers.

The Forrester report also stated that “there can be no Zero Trust without visibility into what’s happening inside networks.” For us, this validates Arista’s overarching zero trust strategy, with the report specifically calling out that “Arista’s vision is unique in that the solution, and as an internal organizational focus, is aligned with Zero Trust principles.”

3
the Wave Report Now!
www.arista.com/security Get

Zero Trust Networking

A zero trust networking approach to security is paramount for organizations looking to build a robust cybersecurity ecosystem today. Based on the premise of explicit trust, zero trust security ensures complete visibility and control over any enterprise network activity, regardless of which device, application, or user is accessing that resource.

The Time for Zero Trust Networking is Now

A new age of edgeless, multi-cloud, multi-device collaboration on hybrid work models has redefined global frontiers and the enterprise threat landscape. As hybrid work models continue to thrive, enterprise data is increasingly exposed to a growing attack surface and newer threats every day. Additionally, with the use of BYOD, IoT devices, and cloud apps becoming the norm, enterprises have a massive increase in the number of unmanaged assets and reduced visibility into their true attack surface.

Arista is trusted and powers the world’s largest data centers and cloud providers based on the quality, support, and performance of its products. The experience gained from working with over 9000 customers has helped redefine software-defined networking and many of our

www.arista.com/security

4

customers have asked us how we plan to address security. To us, security must be a holistic and inherent part of the network. Our customers have been subjected to the fatigue of point products, reactive solutions, proprietary vendor lock-ins, and most of all, operational silos created between CloudOps, NetOps, DevOps, and SecOps. By leveraging cloud principles, Arista’s cloud network architectures bring disparate operations together to secure all digital assets across clients to IoT, campus, data center, and cloud protecting them from threats, thefts, and compromises. Read more…

Arista Zero Trust Security for Cloud Networking

As zero trust has gained popularity as a means to mitigating risk in this new network environment, organizations are struggling with real-world implementation. Read our whitepaper to examine some of the common hurdles in the zero trust journey and how bestin-class organizations measure progress using maturity models from the likes of the Cybersecurity and Infrastructure Agency (CISA) and the analyst firm Forrester. The paper also explores a pervasive network strategy that can help compensate for a lack of maturity in other domains such as devices, workloads, and identities.

Arista’s suite of security solutions helps customers accelerate their journey towards zero trust maturity. Arista supports all the key functions CISA recommends for the network: network segmentation, network traffic management, traffic encryption, and network resilience along with controls for visibility and analytics, automation and orchestration, as well as governance.

www.arista.com/security

5
Arista Zero Trust Networking Architecture Watch video 6 www.arista.com/security Watch video Reasons to shift from Traditional NSM to Arista NDR

Meet with us at Black Hat USA this year in Las Vegas to see how we do security. Be sure to stop by Arista Booth #3119 to learn how we’re helping customersmove from network security to secure,trustednetworks. Find outhowour securitysolutionsaddress challenges for organizations ofall sizes: from thosetrying to implement their zero-trust strategy to those looking to consolidate multiple security and networkingfunctions into a cloud-managed, “edge as a service” solution.

We’ll be featuring thefollowing product demos:

-Arista NDR: AI-driven network detection and response platform

-Arista CUE (Cognitive Unified Edge): Security forthe branchofficedelivered asanedgeas-a-service solution

-CloudVision AGNI: AI-driven network accesscontrol platform delivered as SaaS

JOIN US AT BLACK HAT USA 2023
7 www.arista.com/security Learn more Click here to learn more about our presence at Black Hat USA 2023

Lorenz Ransomware: VoIP Phone Exploitation with LSASSY for Lateral Movement

In this article, Arista's Awake Labs team discusses how their incident response team discovered a ransomware attack targeting Mitel MiVoice Connect devices. Read the blog and learn more about the investigation. Read here…

Data Exfiltration: Detecting Parallel and Multipart Uploads to External Destinations

As the threats grow, you want to be able to detect evasions in multipart uploads with a more robust detection method. Read more…

www.arista.com/security

8

Introducing Network Identity as a Service: CV- AGNI

Network Identity Redefined for Zero Trust Enterprises

Arista is proud to introduce the next frontier of zero-trust networking. We are expanding the CloudVision® platform to include AI-driven Arista Guardian for Network IdentityTM (AGNI). Delivered as Software-as-a-Service and powered by AVA, AGNI brings unprecedented simplicity, scale, and security to identity management for users and IoT alike. With an API-rich strategy, AGNI can integrate at cloud speed with multiple third-party applications while using the network switch as an identity enabler.

Read more…

www.arista.com/security

9

CloudVision AGNI delivers key attributes from client to cloud across the cognitive enterprise

With its cutting-edge features and advanced technology, CloudVision AGNI is the ideal choice for businesses looking to enhance their network security infrastructure. Read more…

Learn more about AI-Driven Network Identity Solution: CV-AGNI

www.arista.com/security

10
Watch Video

CASE STUDY: Ransomware Attack Unfolds in a Manufacturing Industry

Arista NDR was engaged in a Proof of Value trial with a manufacturing company at their Dallas, TX location. While this attack was unfolding in Atlanta, Arista NDR identified suspicious activity from a legitimate (but what appeared to be a compromised) device.

Arista NDR detected this threat by:

● Isolating early warning signs of ransomware like credential abuse, privilege escalation, and network discovery.

● Identifying security measures such as using non - browser encrypted communications.

● Uncovering the use of a malicious domain for ransomware download and distribution.

Download the Case Study

11
www.arista.com/security

SCHEDULE A DEMO: Bridging the gap between network and security.

Arista’s zero trust security portfolio eliminates the need for several network monitoring or security tools by delivering a unified architecture that provides realtime visibility to the threat posture across the network with the ability to take immediate action.

See how Arista’s security solutions can help accelerate your zero trust journey with a short to-the-point demo. Schedule a demo here…

12 www.arista.com/security

Awake Labs experts bring hundreds of years of incident response experience to bear, helping you respond effectively to attacks targeting your infrastructure, whether onpremise, in the cloud or Internet - of-Things and Operational Technology networks. Read more…

Experiencing a security breach? Arista's Awake Labs team can helpRESOLVE AN INCIDENT
Follow us! LinkedIn | Twitter | Facebook | Instagram | YouTube 13 www.arista.com/security

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.