Telos ACA modernizes cyber defenses by illuminating organizations’ threat risk and providing timely and accurate intelligence to defend enterprise assets
Telos Corporation , a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations, announced the launch of its Telos Advanced Cyber Analytics (ACA) solution, which will provide automated, actionable threat intelligence and attribution of malicious activity at speed and scale.
“Current cyber defenses cannot keep up with the ever-evolving hacker ecosystem – and data breaches, ransomware and advanced cyberattacks can cause significant financial and reputational damage to an organization,” said John B. Wood, Telos CEO and chairman. “Telos ACA enables an organization to push its defensive perimeter out globally and see what an adversary is actually doing, unlike what the adversary wants an organization to see.”
Marketing Technology News: Mimecast Opens Office in Singapore to Continue Expansion in APAC
Telos ACA modernizes current cybersecurity and network defense postures by contextualizing the external cyber environment to illuminate the malicious actor’s ecosystem and provides the most timely and accurate intelligence delivered at speed and scale to defend enterprise assets.
“We are at a point where it is imperative for organizations to understand their unique external cyber environment and have the ability to rapidly illuminate and attribute events of concern,” said Stephen Corcoran, chief of cyber strategy, Telos. “Current security systems rely on lagging indicators that are insufficient to protect against malicious actors that employ sophisticated techniques. Telos ACA moves organizations to leading indicators, enabling them to see the initial patterns of malicious activity, rapidly identify nefarious actions and block the identified actor.”
Marketing Technology News: MarTech Interview with Jamie Hill, CEO at adMarketplace
With Telos ACA, customers can:
- Detect malicious activity sooner;
- Uncover and identify previously unknown attacks and new malicious behavior;
- Identify the attribution of events of concern; and
- Provide the C-Suite with sophisticated and comprehensive analytics without expensive overhead, like in-house subject matter experts, and the ongoing support costs of locally managed systems.