CryptoniteNXT aligns with the NIST Cyber Security Framework in three key areas. First, Moving Target Cyber Defense provides a new type of protection which stops lateral movement and reconnaissance. Second, if an endpoint is compromised, CryptoniteNXT will detect attempts to bypass configured policy via segmentation and unauthorized IP access attempts. These blocked attempts are high quality alerts that can be processed by a SIEM or orchestration tool. Third, during a response operation, CryptoniteNXT’s user tagged activity logs enables rapid analysis of what an attacker’s actions were without relying on endpoint logs, netflow or packet captures which often do not have visibility of data about east-west network traffic.
National Institute of Standards and Technology
The National Cybersecurity and Communications Integration Center