Cisco (CSCO) is rolling out new security products aimed at increasing protection against hackers who try to break into businesses using employee credentials.
The service, called Cisco Identity Intelligence, is designed to recognize and alert security personnel to discrepancies in how users move through a company's network, allowing them to track, block, and force intruders from the network. I am.
“Cisco Identity Intelligence bridges the gap between authentication and access by analyzing the entire attack surface of an organization's users, machines, services, apps, data, and their behavior,” said Cisco EVP and Security & said Jeetu Patel, GM of Collaborations. statement.
“We are the first vendor to integrate identity, networking and security into a complete solution to address the biggest cyber challenges of our time,” he added.
Patel said hackers are using increasingly sophisticated methods to obtain employee login credentials. In some cases, he said, attackers call into a company's internal help center and use deepfakes of employee voices to trick the help center employees into believing they are legitimate employees, allowing hackers to You may be asked to provide login credentials.
This is a type of advanced attack that hackers can use to target critical infrastructure and large enterprises. So don't expect someone to use it to break into your girlfriend's Facebook account.
However, if an attacker is able to use stolen credentials to breach a corporate network, Patel said Cisco Identity Intelligence will continue to monitor for suspicious activity. For example, Identity Intelligence alerts corporate cybersecurity professionals when a user logs in from a location they don't normally log in, uses a new device, or attempts to escalate network privileges. Take action against intruders.
In addition to tracking usage patterns, Patel said Identity Intelligence can also determine whether it's been a long time since a user logged into a particular app or whether they were trying to access the corporate network from a particular device. said.
If a company determines that employees no longer need access to these apps or their devices are outdated, cybersecurity personnel can restrict access to the apps and disconnect older devices.
The idea is that by eliminating unnecessary access points to a company's network, hackers have fewer ways to attack the company.
Cybersecurity measures such as multi-factor authentication, which requires logging in using both a username and password and a secret code generated by the app or sent to the device via text, make it even more difficult for hackers to break through. It became difficult. There are still many ways to break into a company's network.
Many companies have employees who don't follow proper cybersecurity protocols, such as reusing usernames and passwords across multiple accounts, which hackers can easily exploit.
But if businesses can determine whether logged-in users should be allowed on the network, they may be able to stop hackers before they can cause significant damage.
daniel howley I'm the technology editor at Yahoo Finance. He has been covering the technology industry since his 2011. You can follow him on Twitter. @Daniel Howley.
Click here for the latest earnings report and analysis, earnings whispers and expectations, and company earnings news.
Read the latest financial and business news from Yahoo Finance