Lastline - DS - Defender - HW SPEC

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Data Sheet

Lastline Defender
Network Detection and Response Platform

Lastline DefenderTM is a Network Detection and Response (NDR) platform that detects and contains
sophisticated threats before they disrupt your business. It delivers the cybersecurity industry’s highest fidelity
insights into advanced threats entering or operating in your entire network, enabling your security team to
respond faster and more effectively to threats.

Collect Analyze Respond

See Threats All-in-One


Automated
Everywhere Powered By AI

Network Web Email NTA


Trigger Workflows
& Provide Forensics
Hybrid Platform IDPS

On Premises Artifact Analysis


Over 100 Integrations:
SIEMs, SOARs, Firewalls, Endpoints...
Cloud Global Threat Intelligence

Detection You
Agentless Visibility Validated Alerts
Can Act On

Figure 1: Lastline Defender Network Detection and Response Platform

Agentless Visibility for Your Entire Network


You can protect network, web, and email traffic with Lastline Defender’s agentless, cloud-based architecture. Lastline® Sensors provide
comprehensive visibility into traffic that crosses your network perimeter (“north/south”) as well as traffic that moves laterally inside your
perimeter (“east/west”), for both your on-premises network and cloud infrastructure.
Install an unlimited number of Lastline Sensors in your on-premises network, as physical and virtual appliances, anywhere you need
visibility. Deploy Sensors as AMI images to extend Lastline Defender protection to your AWS environment.

Lastline Defender Network Detection and Response Platform 1


Data Sheet

Validated Alerts With an All-In-One Platform Powered by Artificial Intelligence


The Lastline Defender NDR platform uses a combination of four complementary technologies powered by artificial intelligence to
detect and analyze the advanced threats that other tools miss, while significantly reducing false positives:

Powered by Artificial Intelligence

Network Traffic Intrusion Detection Artifact Global Threat


Analysis (NTA) and Prevention (IDPS) Analysis Intelligence
Detects anomalous activity Detects and prevents Detects malicious content Updates Lastline Defender’s
and malicious behavior as known threats entering attempting to enter your detection and analysis
it moves laterally across your network network via the web, email, capabilities in real time
your network or file transfers

The Industry’s Most Accurate Threat Detection


Lastline Defender’s NTA applies unsupervised Machine Learning (ML) to your network traffic to detect protocol and traffic
anomalies, and uses supervised ML to automatically create classifiers that recognize malicious network behaviors and previously
unknown malware.
Lastline applies AI to the malicious behaviors and malware samples collected from customers and partners across our Global Threat
Intelligence Network to automatically create new IDPS signatures and push them out to all Lastline Sensors at machine scale.
The patented Artifact Analysis deconstructs every behavior engineered into a file, attachment or URL to determine if it is malicious.
Lastline Defender sees all instructions that a program executes, all memory content, and all operating system activity.

The Industry’s Highest Fidelity Alerts


SOC teams are often overwhelmed by the high volume of low-fidelity alerts generated by their security controls. The
unique combination of NTA, IDPS, and Artifact Analysis, all powered by AI, eliminates most false positives and delivers
unmatched alert accuracy.
The result is that Lastline Defender reduces massive amounts of network data down to a just a handful of intrusions (Fig 2) so that
your analysts can spend their time solving real incidents and protecting your organization, not chasing false positives all day long.

Network and Security


214PB 522M 1,011 91 4
Bytes Processed Network Connections Interesting Events Security Events Intrusions
WITH LASTLINE

4,750 61 12 10
Internal Hosts Internal Hosts Internal Hosts Internal Hosts

Machine Learning, Malware Analysis, Threat Intelligence, and Event Correlation

Figure 2: Lastline Defender reduced 214 PB of data analyzed in one month in one network to only 4 intrusions affecting 10 hosts.

Lastline Defender Network Detection and Response Platform 2


Data Sheet

Visualize the Entire Attack Chain


Lastline Defender classifies malicious activity into different stages (Fig. 3) to identify the risk associated with each stage
of the attack. It also generates a dynamic intrusion blueprint (Fig. 4) and detailed timeline of a threat as it enters and
moves laterally across your on-premises and cloud network. These visualizations give your SOC the information it needs
to quickly understand the scope of the attack and prioritize response.

Attack Stages

Command Credential Lateral


Delivery Exploitation Discovery Collection Exfiltration
and Control access movement

Figure 3: Lastline Defender Helps your SOC team quickly understand the attack stage

Intrusion Blueprint

Email address
Email message
DMSniff
Downloaded file
Hostname iwtrgdye.net
Host
Blacklisted entry
Info
Analysis report
5.45.86.234 172.16.27.9
Threat
172.16.27.17
HTTP request
172.16.27.12

172.16.27.14

DGA activity 172.16.27.16


hceklflq.net

172.16.27.10
172.16.27.15

Figure 4: Lastline Defender shows an attack’s progress in your network including compromised systems and communication with external systems.

Detection You Can Act On


You can rely on Lastline Defender’s high-fidelity insights to automate response and eliminate time-consuming manual investigations of
unknown objects and anomalous activity:
• Deploy Lastline Sensors in blocking mode to stop malicious content and communication at the perimeter or internally, in both
on-premises and cloud environments
• Integrate Lastline Defender with your third-party products such as SIEM, SOAR, endpoint protection and firewalls, custom
applications, and incident response workflows throughout your organization
When integrating with your existing controls, you have the choice of using built-in integration offered by our technology partners or
using our robust APIs to optimize your current technologies, staff, and processes. Your existing security controls can automatically send
unknown objects for analysis and receive actionable threat intelligence in return, before a threat can disrupt your business.

Lastline Defender Network Detection and Response Platform 3


Data Sheet

Certified Hardware Specifications for On-Premises Deployment


1G Sensor 10G Sensor Data Node Manager Detection Engine

Base Model Dell PowerEdge R440

1 2 1 1 1
Processor(s)
Xeon® Silver 4114 Xeon® Silver 4114 Xeon® Silver 4116 Xeon® Silver 4114 Xeon® Silver 4114

RAM 32 GB 128 GB 64 GB 64 GB 64 GB

2 x 1 TB 2 x 1 TB 4 x 2 TB 4 x 2 TB 2 x 1 TB
Hard Disk Drive 3.5 SATA HDD 3.5 SATA HDD 3.5 SAS HDD 3.5 SATA HDD 3.5 SATA HDD
(7.2K RPM) (7.2K RPM) (10K RPM) (7.2K RPM) (7.2K RPM)

Software RAID 1 1 10 10 1

Internal Controller PERC H730p

Intel Intel
Network Adapter Onboard Onboard Onboard
I350 Quad port X710-DA2

Support Plan ProSupport Enterprise

Form Factor 1U Rack-Mount

Weight 43.87 lbs (19.9 Kg)

Dimensions
17.1“ x 25.9“ x 1.7“ (43.4 x 65.7 x 4.3 cm)
(Width x Depth x Height)

Enclosure Fits 19-inch Rack

(up to 4) 1 GbE
Monitoring Ports (4) 1 GbE Ports*** (up to 2) 10 GbE - - -
Ports***

Management Port 1 GbE Port

AC Input Voltage/Current 100~240 VAC / 6.5 A-3.5 A

Power Supply Dual Hot Plug Power 450 W

Operating Temp 10° C to 35° C (50° F to 95° F)

Network Performance Up to 1 GB Traffic Up to 4 GB Traffic - - -

Objects Per Day** Up to 100,000 per day* - - -

Up to 10,000
Files Analyzed - - - -
per day*

Up to 30 Engines
Scalability of Engines - - - -
per Manager

Up to 200 Sensors
Scalability of Sensors - - - -
per Manager
* Cluster N number of components to scale as needed. Performance varies by object type.
** Apply pre-filter to quickly determine maliciousness and submit unknown files for detailed analysis by Deep Content Inspection
*** Supported Intel NIC required for throughput over 200 Mbps
Note: Performance values are based on “standard” profile. Values may vary depending on your environment.

Lastline, Inc. Americas: +1 877 671 3239


1825 S. Grant Street, Suite 635 www.lastline.com
San Mateo, CA 94402 [email protected]
© 2019 Lastline, Inc. All rights reserved. Lastline and the Lastline logo are registered trademarks, and Lastline Defender is a trademark, of Lastline, Inc. All other trademarks are the property of their respective owners.
Lastline technology is protected by U.S. Patents 8910285 and 9361459. Additional patents pending. | v.102019

You might also like