Behavioural attack detection vendor LightCyber opens EMEA office

Behavioural attack detection vendor LightCyber opens EMEA office

The LightCyber Magna platform employs behavioural profiling through machine learning to detect these active attackers by identifying the anomalous operational behaviours of the attack, and enables security analysts to rapidly identify and curtail the attack before damage is done.

LightCyber, a provider of behavioural attack detection solutions, announced it has established its European, Middle East and Africa headquarters in Amsterdam and is building a regional team and network of channel partners. Run by Paul Couturier, Vice President and General Manager, LightCyber EMEA, the company has already hired a staff in multiple countries across Europe and is poised to expand rapidly.

The LightCyber Magna Behavioural Attack Detection platform provides companies with security visibility into active attacks from cybercriminals and insiders that have otherwise already circumvented traditional prevention oriented security infrastructure. The LightCyber Magna platform employs behavioural profiling through machine learning to detect these active attackers by identifying the anomalous operational behaviours of the attack, and enables security analysts to rapidly identify and curtail the attack before damage is done.

“European organisations face an ever-increasing frequency of external and insider threats, with the potential of an eventual data breach, loss of intellectual property and other serious problems becoming a near-certainty,” said Paul Couturier. “Security industry leaders recognise the clear need for a shift in security architectures to add attack detection infrastructure to complement conventional preventative security solutions. With Behavioural Attack Detection, companies can find sophisticated attackers before they succeed in their objectives.”

The LightCyber Magna platform is the first security product to integrate user, network and endpoint context to provide security visibility into a range of attack activity.

Browse our latest issue

Intelligent CISO

View Magazine Archive