solutions - Use Cases - Compliance

National Institute of Standards and Technology (NIST)

  • Network metadata is analyzed by behavioral algorithms to detect threats in real time.
  • Nonstop attacker detection in all cloud/data center workloads and user/IoT devices.
  • Detect and prioritize cyberattacks and trigger real-time notifications to security teams.
  • Consistent reporting of threat detections, causes, business impacts, and steps to verify.
Get the NIST compliance brief

General Data Protection Regulation (GDPR)

  • Augment data handling standards by detecting unauthorized access of personal information.
  • Early detection of hidden cyberattacker behaviors that evade security defenses.
  • Meet the 72-hour notification timeframe using rich context about cyberattacks and a forensic trail of evidence.
  • Monitor nonstop all cloud/data center workloads and user/IoT devices for impact assessment.
Get the GDPR compliance brief

Federal Financial Institutions Examination Council (FFIEC)

  • Prioritize and correlate the highest-risk threats with compromised in-scope assets.
  • Early detection of ransomware, other malware variants and hidden attacker behaviors.
  • Real-time detection of suspicious use of admin credentials and data from key in-scope assets.
  • Nonstop detection of attack behaviors in all cloud/data center workloads and user/IoT devices.
Get the FFIEC compliance brief

Payment Card Industry Data Security Standard (PCI DSS)

  • Detect early signs of SQL injection attempts, even if the vulnerability or exploit is unknown.
  • Identify suspicious attempts by devices and user accounts to access cardholder data.
  • Real-time detection of compromised user credentials and sharing of access information.
  • Track device activity over time, even if the IP address changes and is used by multiple people.
Get the PCI DSS compliance brief

Defense Federal Acquisition Regulation Supplement (DFARS)

  • Baseline system behaviors by monitoring all cloud/data center workloads and user/IoT devices.
  • Detect the suspicious use of admin credentials and the abuse of administrative protocols.
  • Network metadata is analyzed by behavioral algorithms to detect threats in real time.
  • Detect and prioritize cyberattacks and trigger real-time notifications to security teams.
Get the DFARS compliance brief

MITRE ATT&CK for Enterprise

  • Automatically detect and triage 91% of network tactics identified in the MITRE ATT&CK framework.
  • Real-time analysis of threat behaviors in all network traffic – endpoints, servers, virtual workloads and the cloud.
  • Network-wide attacker detection is the most reliable and conclusive way to identify the highest-risk threats.
  • Goes well beyond the ATT&CK framework to detect attackers that encrypt their communication in hidden tunnels.
Get the MITRE ATT&CK compliance brief

CIS Critical Security Controls

  • Passively monitor and analyze all network traffic to identify authorized and unauthorized devices.
  • Real-time detection of suspicious use of admin credentials and data from key in-scope assets.
  • Early detection of ransomware, other malware variants and hidden attacker behaviors.
  • Detect cyberattackers in hidden DNS, HTTP and HTTPS tunnels and encrypted traffic.
Get the CIS Critical Security Controls compliance brief

Adaptive Security Architecture

  • Real-time automated threat detection from cloud and data center workloads to user and IoT devices.
  • Complement prevention efforts by providing intelligence about what to block and when.
  • Drive dynamic response rules, and trigger a response from security enforcement points.
  • Threat intelligence gathered and analyzed to minimize enterprise asset exposure and risk.
Get the Adaptive Security Architecture compliance brief