Narus (News - Alert), Inc. has unveiled a ground-breaking application classification technology, Application Whitelisting Technology. The process of creating application signatures and recognizing them instantaneously is computerized by this technology. As compared to the conventional laborious method, wherein several days are spent recognizing and creating signatures for unidentified applications, the latest technology achieves the same in just a few seconds. Enterprises are therefore offered the required visibility and control for operating their networks in a protected manner.
Organizations face difficulties while tracking and safeguarding their networks due to the rising volume of the latest, network-based applications being launched in a quick succession. This issue is further enlarged due to mobile applications, which can be productively utilized at work via smartphones and tablets. IT experts therefore have to spot applications on their enterprise’s network and create a signature for all the applications. With the conventional method of performing the reverse-engineering process, unidentified applications are often not tracked for several days, threatening the security of the network.
In a statement, John Trobough, president, Narus said, "The sheer volume of new applications and protocols on the network is tremendous, and will only continue to increase in today's hyper-connected world. The ability to detect and identify them quickly is an important ingredient of maintaining control and ensuring security of critical assets. Narus' Application Whitelisting Technology enables the automatic discovery and classification of these new applications and protocols in seconds, ensuring organizations can always stay ahead of potential threats."
The inadequacies of the laborious reverse engineering process have been tackled by Narus by launching the machine learning application identification and parsing technology. A better amount of visibility, control and context is provided to cyber activity with this technology which advantageously uses the fundamentals of Cyber 3.0 for relating machine learning to cybersecurity. Human involvement in the reverse-engineering process is therefore eliminated. The existence of unidentified application is recognized on its own using patented algorithms, which then create the equivalent signatures and labels in seconds. Any harmful impact of latest network-based applications is avoided using this technology.