Cyberhaven Applies Behavioral Analytics to Better Secure Data

Fresh off raising an additional $13 million in financing, Cyberhaven has launched a tool that enables cybersecurity teams to track how data is being moved across an extended enterprise.

Cyberhaven CEO Volodymyr Kuznetsov said the Data Behavior Analytics (DaBA) service developed by the startup makes it possible to record and analyze the flow of data across all corporate assets, including software-as-a-service (SaaS) applications and custom homegrown applications, without having to make any changes to the data itself.

Based on those data flows, it then becomes easier for cybersecurity teams to construct policies that reflect the actual workflow of the organization, said Kuznetsov.

In contrast to existing data loss prevention (DLP) tools or cloud access service brokers (CASBs), DaBA employs behavior analytics to identify workflows and identify potential breaches. That approach eliminates any need to inject code into an application that cybersecurity teams might want to track, said Kuznetsov.

Cyberhaven also provides more visibility into the type of data that is being exfiltrated, which Kuznetsov said makes it possible to prioritize breaches involving, for example, the theft of critical intellectual property. Once cybersecurity teams suspect a data breach has occurred, it also becomes a lot easier for cybersecurity teams to figure out how data was exfiltrated, including not only where data went but also who accessed it when, said Kuznetsov.

DaBA was developed using technologies and techniques pioneered by the U.S. Defense Advanced Research Projects Agency (DARPA), Kuznetsov said, which wanted to create a tool for tracking data usage that didn’t necessarily require a team of data scientists to set up and employ. Cyberhaven is now making that capability available to IT organizations via a software-as-service (SaaS) application that tracks such things as when data has been downloaded from a cloud application.

The most immediate benefit is the reduced time and effort required for any forensics processes in the wake of a data breach. Many cybersecurity teams today spend a lot more time trying to figure out what happened than they do remediating whatever vulnerability was exploited, either by an insider or someone who has compromised the credentials of an insider.

There’s a direct correlation between the amount of time cybersecurity teams spend investigating breaches and the amount of fatigue being generated. Most organizations are short-handed when it comes to available cybersecurity expertise. Tools that are made available as a cloud service have the potential to not only improve morale by reducing fatigue but also dramatically improve the productivity of the cybersecurity team without increasing headcount.

Of course, the real goal is to narrow the gap between when a data breach occurs and the response to that event. There may come a day when any data breach immediately triggers a set of controls that either limit the extent of that breach or encrypts data in a way that immediately renders it useless. In the meantime, however, the first step toward achieving that goal is deterring who is legitimately accessing data for what purpose.

Michael Vizard

Featured eBook
The State of Cloud Native Security 2020

The State of Cloud Native Security 2020

The first annual State of Cloud Native Security report examines the practices, tools and technologies innovative companies are using to manage cloud environments and drive cloud native development. Based on a survey of 3,000 cloud architecture, InfoSec and DevOps professionals across five countries, the report surfaces insights from a proprietary set of well-analyzed data. This ... Read More
Palo Alto Networks

Michael Vizard

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

mike-vizard has 255 posts and counting.See all posts by mike-vizard