{"id":45260,"date":"2022-02-11T22:17:39","date_gmt":"2022-02-11T22:17:39","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics"},"modified":"2022-02-11T22:17:39","modified_gmt":"2022-02-11T22:17:39","slug":"aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/","title":{"rendered":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Santa Clara, CA \u2014 February 9, 2022<\/strong> \u2013 Aviatrix, the pioneer of secure cloud networking, has announced new security features for <a href=\"https:\/\/aviatrix.com\/threat-iq\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/aviatrix.com\/threat-iq\/&amp;source=gmail&amp;ust=1644704199920000&amp;usg=AOvVaw2TifWNDBPg53TbRg2tkJDM\" rel=\"noopener\"><em>ThreatIQ with ThreatGuard <sup>tm<\/sup><\/em><\/a>. With its new capabilities, Aviatrix ThreatIQ\u2122 now provides continuous <em>Network Behavior Analytics<\/em>, built into the cloud network fabric. Fingerprinting workload and traffic characteristics to form a baseline, the analytics are customized for every environment, improve over time, and are complementary to signature-based threat defenses.<\/p>\n<p><em>ThreatIQ with ThreatGuard <sup>tm<\/sup><\/em> embeds security across the Aviatrix multi-cloud data plane and enables every network node to provide security inspection and enforcement. Distributed threat visibility and control built natively into the network data plane identifies traffic to malicious destinations and safely enables policy-based automated remediation.<\/p>\n<p>\u201cThe priority for PACCAR\u2019s cloud infrastructure team is to quickly respond to the dynamic needs of our business and our customers, supporting an evolving supply chain landscape while also delivering new global connected services to customers,\u201d said Dallas Thornton, Director, Digital Services at PACCAR. \u201cAviatrix is a critical part of our architecture that enables us to deliver new business capabilities while layering in enhanced security natively into our multi-cloud networking infrastructure.\u201d<\/p>\n<p><strong>Securing the Cloud at the Network Layer \u2013 It\u2019s time to take a cloud-centric approach to security.<\/strong><\/p>\n<p>\u201cSecurity challenges continue to evolve in the cloud, with increasingly porous exposure, and no single perimeter,\u201d said Bryan Ashley, Vice President of Product Marketing at Aviatrix. \u201cOur customers are looking for multi-cloud native capabilities like Network Behavior Analytics to help secure their business-critical infrastructure and enhance their cloud security posture.\u201d<\/p>\n<p><strong>Traditional Solutions Alone Leave Gaps<\/strong><\/p>\n<p>Signature-based traditional solutions are not cloud-aware, featuring only a single point of inspection, and function with a legacy operational model.<\/p>\n<p>This leaves the enterprise vulnerable to unacceptable business risks, including data loss, exfiltration, and resource hijacking, resulting in potentially devastating financial impact, not to mention loss of customer trust and significantly reduced agility.<\/p>\n<p>\u201cEnterprises and government organizations alike are aware of how public cloud introduces entirely new risk vectors, however they continue to struggle with developing and operating an architecture to properly address this exposure,\u201d said Yves Vazquez, Sr. Manager at Accenture Federal Services. \u201cAviatrix is focused on supporting our mutual government customers as they seek to enhance secure cloud networking architectures.\u201d<\/p>\n<p><strong>Network Behavior Analytics \u2013 Business Value<\/strong><\/p>\n<p>With the <em>Network Behavior Analytics<\/em> included in <em>ThreatIQ<\/em>, Aviatrix customers benefit from an enhanced security posture, resulting in reduced security risk. Security is built directly into your cloud network, as opposed to a \u2018bolt-on\u2019 afterthought, while the proactive approach reduces the time to identify unknown threats.<\/p>\n<p><strong>Reducing Infrastructure Cost for Distributed Inspection and Control<\/strong><\/p>\n<p>According to <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.ibm.com\/security\/data-breach&amp;source=gmail&amp;ust=1644704199920000&amp;usg=AOvVaw2WzjU6IrUYizsahInjr2Y8\" rel=\"noopener\">IBM 2021 Cost of Data Breach Report<\/a>, \u201cThe average total cost of a data breach increased by nearly 10% year over year to $4.24 million), the largest single year cost increase in the last seven years\u2026.Costs were 80% lower for organizations with a more mature security posture leveraging AI and automation (for security anomaly detection).\u201d<\/p>\n<p>By reducing the time and cost to identify and contain a breach, the <em>Network Behavior Analytics<\/em> in <em>ThreatIQ<\/em> reduce infrastructure costs while complementing existing security investments.<\/p>\n<p><strong>More about ThreatIQ with ThreatGuard<\/strong><\/p>\n<p>By inspecting traffic in real-time as it crosses the network, <em>ThreatIQ with ThreatGuard<\/em> provides deeper visibility into activities potentially missed by traditional network security approaches such as NGFW and other legacy solutions. Embedded into the Aviatrix multi-cloud data plane, these capabilities enable every network node to provide traffic inspection and enforcement, while policy-based automated remediation of identified threats eliminates delays with manual administrative action and review.<\/p>\n<p><strong>Aviatrix Secure Cloud Networking<\/strong><\/p>\n<p>Aviatrix secure cloud networking is software-deployed and operated by enterprise customers. The software directly programs the native cloud constructs to maintain the simplicity and automation unique to each cloud provider. Aviatrix adds advanced networking, security, automation, and day-two operational visibility for enterprises using one or more public clouds. With today\u2019s cloud transformation, enterprises are designing their cloud networks based on the Multi-Cloud Network Architecture (MCNA), the reference architecture for enterprises to design, deploy and operate a repeatable network and security architecture that is consistent across any public cloud.<\/p>\n<p><strong>Pricing and Availability<\/strong><\/p>\n<p>ThreatIQ with ThreatGuard is available immediately from Aviatrix, authorized partners and public cloud marketplaces. More information on ThreatIQ with ThreatGuard is available <a href=\"https:\/\/aviatrix.com\/threat-iq\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/aviatrix.com\/threat-iq\/&amp;source=gmail&amp;ust=1644704199920000&amp;usg=AOvVaw2TifWNDBPg53TbRg2tkJDM\" rel=\"noopener\">here<\/a>.<\/p>\n<p><strong>About Aviatrix<\/strong><\/p>\n<p>Aviatrix, the pioneer of secure cloud networking, delivers advanced cloud networking, network security and operational visibility required by enterprises with cloud-native simplicity and automation. More than 550 customers worldwide leverage Aviatrix and its proven multi-cloud network reference architecture to design, deploy and operate a repeatable network and security architecture that is consistent across any public cloud. Combined with the industry\u2019s first and only multi-cloud networking certification (ACE), Aviatrix is empowering IT to lead and accelerate the transformation to the cloud. Learn more at <a href=\"https:\/\/aviatrix.com\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/aviatrix.com\/&amp;source=gmail&amp;ust=1644704199920000&amp;usg=AOvVaw3oqalfEcIm3w8z4o8IbPr8\" rel=\"noopener\">Aviatrix.com<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New capabilities added to Aviatrix ThreatIQ improve enterprise security posture to reduce business risk.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45260","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T22:17:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics\",\"datePublished\":\"2022-02-11T22:17:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/\"},\"wordCount\":795,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/\",\"name\":\"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2022-02-11T22:17:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/","og_locale":"en_US","og_type":"article","og_title":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-11T22:17:39+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics","datePublished":"2022-02-11T22:17:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/"},"wordCount":795,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/","url":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/","name":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2022-02-11T22:17:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/aviatrix-enhances-secure-cloud-networking-with-network-behavior-analytics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45260"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45260\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}