As it exits a three-year long stealth mode, security startup vArmour plans to announce Tuesday exactly how its technology works.
The startup operates under the premise that today’s data centers are no longer simply relegated to physical locations, but are instead vast virtualized networks influenced by the likes of [company]Google[/company]. Because many companies’ data centers are now big distributed systems, the folks at [company]vArmour[/company] believe that enterprises need to be aware of all the going-ons in a network and should monitor the behavior of all that traffic to spot malware or other potential problems posed by hackers.
To tackle this network dilemma, users can sign up for vArmour’s service, which installs thousands of software sensors throughout their entire network. The sensors can be all connected together to provide an “intelligent fabric” that “can correlate information across data centers and the cloud to provide a better security sense,” said Tim Eades, CEO of vArmour.
Users can load up the sensors in whatever part of their internal network that they feel needs to be monitored, such as next to a virtual machine running applications or on top of a rack in their physical data center. The point is to have the sensors in the areas of the network where traffic and data passes through. Through these sensors, users should be able to see if malware or other security threats may be lurking around. For example, the vArmour’s sensors can detect unusual traffic patterns that could tip a user off if something unusual may be happening in their systems.
The startup also provides a user interface that details the network’s connectivity paths and an orchestration tool that can help direct network traffic to allow for an “easy way to fire up another enforcement point” should a person need to.
Eades describes vArmour’s product as being a “magnifying glass with a hammer,” in that if a user were to discover an anomaly, he or she could take action and choose to shut down a corrupted virtual machine or stop the flow of a data packet. However, instead of simply shutting everything down after a threat is detected, Eades recommends studying the data center and network first so a user can learn how the threat came to be and how it might spread.
“One of the most amazing things is when [companies] find criminals inside the network, the last thing you want to do is stop them immediately,” said Eades. “You need an intermediary step. If you stop [the security threat], you miss its relationships and how its explored your network and you can see its patterns.”
In August, vArmour took in $21 million in a series C funding round bringing the company’s total funding to $42 million.
Post and thumbnail images courtesy of Shutterstock user Vasin Lee.