ExtraHop, the pioneer in cloud-native network intelligence, announces that security and solutions provider Axians is using ExtraHop for its core security offering, the Circle of Visibility.

This cybersecurity offering marries three solutions—NDR, EDR, and SIEM—to help organizations detect, investigate, and ultimately stop advanced attacks before they can do significant damage. Many organizations have a strong preventative posture, yet have fallen victim to a cyberattack.

Significant data loss

Approximately 75% of security budgets go to preventing intrusion, and yet more than 80% of organizations have experienced a ransomware incident in the past five years. With its Circle of Visibility offering, Axians is bringing together best-in-class detection and response technologies to provide streamlined, contextual visibility from the network to the endpoint to help organizations detect and stop cyberattacks before they result in significant data loss, business downtime, and reputational harm.

Axians is bringing together best-in-class detection and response technologies to provide streamlined

Like every organization today, we have to deal with large and evolving attack surfaces, constant threats from cybercriminals, and regulation requirements. Organizations need to assume that attackers are actively operating inside their hybrid environments, moving laterally, and evading traditional security controls," said David Maes, IT Manager, Boels Rental.

Overall security posture

David Maes adds, "We leverage ExtraHop and Axians’ Circle of Visibility to improve our overall security posture and reliably detect, investigate, and respond to malicious behavior.”

The ExtraHop Reveal(x) platform adds critical network intelligence to the Axians Circle of Visibility offering. By applying advanced AI, behavioral analytics, and strategic decryption to live network telemetry, ExtraHop Reveal(x) identifies the stealthy attack techniques and lateral movement associated with the most advanced threats.

When attack activity is detected, ExtraHop Reveal(x) customers can quickly pivot to investigate down to the packet level and then respond with speed, before the attack can spread. “ExtraHop’s network intelligence is the ground source of truth for an organization. The network does not lie,” said Roel van de Pol, Solution Architect at Axians.

Modern security operations

Axians Circle of Visibility also complies with NIS2, a European Union-wide legislation on cybersecurity

Roel van de Pol adds, “It can tell us exactly how attackers are moving within an organization, staging data, or communicating back to their home base. It also provides visibility into endpoints where an agent can’t be installed. As enterprises shift to a detect and respond mindset, this triad of technology with ExtraHop Reveal(x) at its core will help reduce the chance that an attacker can reach its end goal.”

"Network detection and response is rapidly emerging as a must-have capability in modern security operations. Axians’ Circle of Visibility offering with ExtraHop's cyber defense platform provides comprehensive attack surface visibility for defenders,” said Sandra Hilt, AVP, Channel Sales, EMEA, at ExtraHop, adding “We believe Axians has the reach, relationships, and drive to help accelerate ExtraHop's business growth in Europe and we’re thrilled to be part of this offering."

Axians Circle of Visibility also complies with NIS2, a European Union-wide legislation on cybersecurity that aims to strengthen the security requirements for organizations across the region.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...