STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Similar documents
BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

Technical Brochure F-SECURE THREAT SHIELD

Managed Endpoint Defense

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

HOLISTIC CYBER SECURITY FOR BUSINESSES

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

MESSAGING SECURITY GATEWAY. Solution overview

RSA NetWitness Suite Respond in Minutes, Not Months

Traditional Security Solutions Have Reached Their Limit

esendpoint Next-gen endpoint threat detection and response

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

THE ACCENTURE CYBER DEFENSE SOLUTION

RSA INCIDENT RESPONSE SERVICES

with Advanced Protection

RSA INCIDENT RESPONSE SERVICES

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Transforming Security from Defense in Depth to Comprehensive Security Assurance

CYBER RESILIENCE & INCIDENT RESPONSE

SIEM Solutions from McAfee

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Securing Digital Transformation

THE EVOLUTION OF SIEM

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Security Automation Best Practices

Are we breached? Deloitte's Cyber Threat Hunting

TRUE SECURITY-AS-A-SERVICE

Advanced Malware Protection: A Buyer s Guide

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Carbon Black PCI Compliance Mapping Checklist

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

MITIGATE CYBER ATTACK RISK

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Security Operations & Analytics Services

ForeScout Extended Module for Splunk

SIEMLESS THREAT MANAGEMENT

locuz.com SOC Services

Best Practices in Securing a Multicloud World

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Security-as-a-Service: The Future of Security Management

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

McAfee Endpoint Threat Defense and Response Family

CloudSOC and Security.cloud for Microsoft Office 365

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Incident Response Services

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

SIEM: Five Requirements that Solve the Bigger Business Issues

Power of the Threat Detection Trinity

to Enhance Your Cyber Security Needs

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

MANAGED DETECTION AND RESPONSE

PALANTIR CYBERMESH INTRODUCTION

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

Resolving Security s Biggest Productivity Killer

SIEMLESS THREAT DETECTION FOR AWS

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

FOR FINANCIAL SERVICES ORGANIZATIONS

Security Incident Management in Microsoft Dynamics 365

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

Security. Made Smarter.

GDPR: An Opportunity to Transform Your Security Operations

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Background FAST FACTS

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Managed Security Services - Endpoint Managed Security on Cloud

HOSTED SECURITY SERVICES

THALES DATA THREAT REPORT

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Mastering The Endpoint

Microsoft Security Management

Transcription:

STAY ONE STEP AHEAD OF THE CRIMINAL MIND F-Secure Rapid Detection & Response

INTRO PROTECT YOUR BUSINESS AND ITS DATA AGAINST ADVANCED ATTACKS Effective pre-compromise threat prevention is the cornerstone of cyber security, but you can t rely on preventive measures alone to keep your business and its data safe from the Tactics, Techniques and Procedures adversaries use in targeted attacks. The continuously evolving threat landscape, along with regulatory demands such as GDPR, require companies to be prepared for postcompromise breach detection. That means ensuring a company is capable of rapidly responding to advanced attacks. F-Secure s Rapid Detection & Response solution, which is trained by an experienced threat hunting team, enables your own IT team or a certified service provider to protect your organization against advanced threats. With the backing of F-Secure s world-class cyber security experts, your own IT specialists will be able to respond to incidents swiftly and effectively. Or by letting a service provider manage your organization s detection and response operations, you can focus on your core business and rely on expert guidance whenever under attack. VULNERABILITY MANAgement PRE-COMPROMISE consulting and assesment ADVANCED THREAT PROTECTION POST-COMPROMISE ENDPOINT PROTECTION services 2

OVERVIEW STOP TARGETED ATTACKS QUICKLY WITH GUIDANCE You need both the best technology and the latest human expertise to shield your organization against advanced cyber threats. F-Secure s industry-leading Endpoint Detection & Response (EDR) solution gives you contextual visibility into advanced threats, enabling you to detect and respond to targeted attacks with automation and guidance. When a breach occurs, you need more than just an alert. In order to plan the best response possible, you need to understand the specifics of the attack. Our Broad Context Detection mechanisms, together with certified service providers and built-in automation, will quickly stop the attack and provide actionable advice for further remediation actions 3

HOW IT WORKS F-Secure s industry-leading technology at your service 1. Lightweight sensors deployed across endpoints monitor behavioral events generated by users, and stream them to our cloud in real-time. 2. Our real-time behavioral data analytics and Broad Context Detection mechanisms narrow down the data, distinguishing malicious behavior patterns from normal user behavior to quickly identify real attacks. 3. Alerts with visualized broad context and descriptive information about the attack makes confirming a detection easy, either by the F-Secure Partner or by your own IT team, with an option to elevate tough investigations to F-Secure. 4. Following a confirmed detection, the solution provides advice and recommendations to guide you through the necessary steps to contain and remediate the threat 4

HOW IT WORKS LOOKING FOR A NEEDLE IN A HAYSTACK A REAL WORLD EXAMPLE Detecting advanced threats by spotting the small individual events attackers trigger is like trying to find a needle in a haystack. In a 325-node customer installation, our sensors collected around 500 million events over a period of one month. Raw data analysis in our back end systems filtered that number down to 225,000 events. Suspicious events were further analyzed by our Broad Context Detection mechanisms to narrow down the number of detections to a mere 24. Finally, those 24 detections were reviewed in detail, with only 7 being confirmed as real threats. Enabling IT and security teams to focus on fewer and more accurate detections results in faster and more effective response actions whenever under a real cyber attack. 500 MILLION Data events / month Collected by 325 endpoint sensors 225 000 SUSPICIOUS EVENTS After real-time behavioral analysis of the events 24 DETECTIONS After adding broader context to the suspicious events 7 REAL THREATS After confirming detections as real threats 5

BENEFITS VISIBILITY Gain immediate visibility into your IT environment and security status Improves visibility into IT environment and security status through application and endpoint inventory Identifies suspicious activity by collecting and correlating behavioral events beyond commodity malware Provides alerts with broad context information and asset criticality, making incident response easier DETECTION Protect your business and its sensitive data by detecting breaches quickly Detect and stop targeted attacks quickly to minimize business interruptions and negative brand impact Have the solution set up within hours, allowing you to be ready for breaches immediately Meet the regulatory requirements of PCI, HIPAA, and GDPR that require breaches to be reported within 72 hours RESPONSE Respond swiftly with guidance and automation whenever under attack Built-in automation and intelligence help your team focus only on real attacks Alerts include appropriate response guidance, with an option to automate response actions around the clock Overcome your skill or resource gap by responding to attacks with a certified service provider that is backed by F-Secure 6

FEATURES Endpoint Sensors Lightweight, discreet monitoring tools designed to work with any endpoint protection solution Lightweight sensors are deployed on all relevant computers within your organization Single-client and management infrastructure with F-Secure s endpoint security solutions The sensors collect behavioral data from endpoint devices without compromising users privacy Broad Context Detection F-Secure s proprietary detection technology makes understanding the scope of a targeted attack easy Real-time behavioral, reputational and big data analysis with machine learning Automatically places detections into a context visualized on a timeline Includes risk levels, affected host criticality and the prevailing threat landscape Application Visibility Gaining visibility into your IT environment and security status has never been easier Identifies all harmful or otherwise unwanted applications, and the foreign destinations of different cloud services Leverages F-Secure s reputational data to identify potentially harmful applications Restricts potentially harmful applications and cloud services even before data breaches happen Guided Response Prepares you to deal with even the most advanced cyber attacks with your existing resources Built-in step-by-step response guidance and remote actions to stop attacks Certified service providers guide and support you through response actions Unique Elevate to F-Secure threat analysis and expert guidance service backs you up Automated Response Reduce the impact of targeted cyber attacks by automating response actions around the clock Automated response actions based on criticality, risk levels and predefined schedule Criticality and risk levels provided by the solution allow prioritization of response actions Contain attacks quickly even if your team is only available during business hours FOR A VIDEO GO TO www.f-secure.com/rdr 7

ABOUT F-SECURE A STEP AHEAD OF THE CRIMINAL MIND How do you detect a sophisticated attack? You make use of the most advanced analytics and machine learning technologies. But that s not all. You ve got to think like an attacker. + www.f-secure.com www.twitter.com/fsecure www.facebook.com/f-secure F-Secure s security experts have participated in more European cyber crime investigations than any other company. With our experts fingers firmly on the pulse of the cyber attack landscape, you ll stay up to date with the latest threat intelligence. Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections. F-Secure s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. F-Secure s security experts have participated in more European cyber crime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers. Founded in 1988, F-Secure is listed on the NASDAQ OMX Helsinki Ltd.