esendpoint Next-gen endpoint threat detection and response

Similar documents
Managed Endpoint Defense

MANAGED DETECTION AND RESPONSE

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Managed Detection and Response

SOLUTION BRIEF Virtual CISO

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Reducing the Cost of Incident Response

RSA INCIDENT RESPONSE SERVICES

Traditional Security Solutions Have Reached Their Limit

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

RSA INCIDENT RESPONSE SERVICES

RSA NetWitness Suite Respond in Minutes, Not Months

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

A Closer Look: The esentire Difference. Setting the Industry Standard for Managed Detection and Response PURPOSE WHAT YOU WILL LEARN INTENDED AUDIENCE

A Closer Look: The esentire Difference. Setting the Industry Standard for Managed Detection and Response PURPOSE WHAT YOU WILL LEARN INTENDED AUDIENCE

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Resolving Security s Biggest Productivity Killer

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

WHITEPAPER. Enterprise Cyber Risk Management Protecting IT Assets that Matter

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

deep (i) the most advanced solution for managed security services

Incident Response Services

Incident Response Agility: Leverage the Past and Present into the Future

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

RSA ADVANCED SOC SERVICES

SIEM Solutions from McAfee

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SentinelOne Technical Brief

THE ACCENTURE CYBER DEFENSE SOLUTION

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SentinelOne Technical Brief

4/13/2018. Certified Analyst Program Infosheet

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

ForeScout Extended Module for Splunk

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Incorporating Hunt Teams To Defend Your Enterprise

Advanced Endpoint Protection

Whitepaper. Advanced Threat Hunting with Carbon Black Enterprise Response

Application Whitelisting and Active Analysis Nick Levay, Chief Security Officer, Bit9

Readiness, Response & Resilence:

Cybersecurity Considerations for GDPR

TRUE SECURITY-AS-A-SERVICE

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

FROM SIEM TO SOC: CROSSING THE CYBERSECURITY CHASM

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Security Operations & Analytics Services

End-to-End Security Analytics with the Elastic Stack. Samir Bennacer

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

BUILDING AND MAINTAINING SOC

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

ADVANCED THREAT HUNTING

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

An All-Source Approach to Threat Intelligence Using Recorded Future

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

CYBER RESILIENCE & INCIDENT RESPONSE

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

to Enhance Your Cyber Security Needs

CyberArk Privileged Threat Analytics

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 05/24/2017

Sustainable Security Operations

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

THE EVOLUTION OF SIEM

Security. Made Smarter.

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

MITIGATE CYBER ATTACK RISK

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Carbon Black PCI Compliance Mapping Checklist

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

SECURITY SERVICES SECURITY

The Cognito automated threat detection and response platform

empow s Security Platform The SIEM that Gives SIEM a Good Name

Get Armoured Against Endpoint Attacks. Singtel Business. Managed Defense Endpoint Services Threat Detection and Response (ETDR)

Advanced Malware Protection: A Buyer s Guide

Symantec Ransomware Protection

ForeScout Extended Module for Carbon Black

Advanced Threat Hunting:

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cylance Axiom Alliances Program

Transcription:

DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that all endpoint activity is potentially malicious, we watch and record every activity and investigate potentially malicious signals leveraging proprietary attack pattern and behavioral analytics, not merely signatures or IOCs. We ensure that threats are detected, which empowers esentire security analysts to: WHAT DOES ESENDPOINT HELP YOU SOLVE? Limited endpoint visibility on/off the network Inadequate detection capabilities of known and unknown threats Prolonged incident dwell time Alert fatigue: Chasing too many false positives Lack of in-house expertise to proactively hunt and respond to threats Alert you to confi rmed and suspicious activity Visualize the full attack chain BENEFITS Isolate threats on your behalf Stop attackers earlier in the kill chain Conduct post-attack analysis Aid in co-managed remediation As a result, your organization can minimize the detection to recovery timeframe, mitigating the risk of a potential breach that could affect your organization and the clients you serve. Provides full endpoint visibility: Who, what, why and how it happened Reduces risk associated with the human factor Vastly reduces detection to recovery timeframe Results in greater security investment ROI Complements traditional anti-virus Satisfi es compliance requirements WHAT DOES ESENDPOINT DETECT? Zero-day File-less Advanced Obfuscated Lateral Abnormal persistent executables movement behaviour threats

DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that all endpoint activity is potentially malicious, we watch and record every activity and investigate potentially malicious signals leveraging proprietary attack pattern and behavioral analytics, not merely signatures or IOCs. WHAT DOES ESENDPOINT HELP YOU SOLVE? Limited endpoint visibility on/off the network Inadequate detection capabilities of known and unknown threats We ensure that threats are detected, which empowers esentire security analysts to: Alert you to confi rmed and suspicious activity Visualize the full attack chain Isolate threats on your behalf Prolonged incident dwell time Alert fatigue: Chasing too many false positives Lack of in-house expertise to proactively hunt and respond to threats Stop attackers earlier in the kill chain Conduct post-attack analysis Aid in co-managed remediation BENEFITS Provides full endpoint visibility: Who, what, why and how it happened As a result, your organization can minimize the detection to recovery timeframe, mitigating the risk of a potential breach that could affect your organization and the clients you serve. Reduces risk associated with the human factor Vastly reduces detection to recovery timeframe Results in greater security investment ROI Complements traditional anti-virus Satisfi es compliance requirements WHAT DOES ESENDPOINT DETECT? Zero-day File-less Advanced Obfuscated Lateral Abnormal persistent executables movement behaviour threats

DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that all endpoint activity is potentially malicious, we watch and record every activity and investigate potentially malicious signals leveraging proprietary attack pattern and behavioral analytics, not merely signatures or IOCs. WHAT DOES ESENDPOINT HELP YOU SOLVE? Limited endpoint visibility on/off the network Inadequate detection capabilities of known and unknown threats We ensure that threats are detected, which empowers esentire security analysts to: Alert you to confi rmed and suspicious activity Visualize the full attack chain Isolate threats on your behalf Prolonged incident dwell time Alert fatigue: Chasing too many false positives Lack of in-house expertise to proactively hunt and respond to threats Stop attackers earlier in the kill chain Conduct post-attack analysis Aid in co-managed remediation BENEFITS Provides full endpoint visibility: Who, what, why and how it happened As a result, your organization can minimize the detection to recovery timeframe, mitigating the risk of a potential breach that could affect your organization and the clients you serve. Reduces risk associated with the human factor Vastly reduces detection to recovery timeframe Results in greater security investment ROI Complements traditional anti-virus Satisfi es compliance requirements WHAT DOES ESENDPOINT DETECT? Zero-day File-less Advanced Obfuscated Lateral Abnormal persistent executables movement behaviour threats

DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that all endpoint activity is potentially malicious, we watch and record every activity and investigate potentially malicious signals leveraging proprietary attack pattern and behavioral analytics, not merely signatures or IOCs. We ensure that threats are detected, which empowers esentire security analysts to: Alert you to confi rmed and suspicious activity Visualize the full attack chain Isolate threats on your behalf Stop attackers earlier in the kill chain Conduct post-attack analysis Aid in co-managed remediation As a result, your organization can minimize the detection to recovery timeframe, mitigating the risk of a potential breach that could affect your organization and the clients you serve. WHAT DOES ESENDPOINT HELP YOU SOLVE? Limited endpoint visibility on/off the network Inadequate detection capabilities of known and unknown threats Prolonged incident dwell time Alert fatigue: Chasing too many false positives Lack of in-house expertise to proactively hunt and respond to threats BENEFITS Provides full endpoint visibility: Who, what, why and how it happened Reduces risk associated with the human factor Vastly reduces detection to recovery timeframe Results in greater security investment ROI Complements traditional anti-virus Satisfi es compliance requirements WHAT DOES ESENDPOINT DETECT? Zero-day File-less Advanced Obfuscated Lateral Abnormal persistent executables movement behaviour threats

HOW DOES IT WORK? esendpoint watches and records everything on the endpoint using Carbon Black Response. API-integrated detection and investigation capabilities are combined with esentire s signal enrichment, processing and advanced analytics empowering esentire security analysts to: Investigate Root Cause Where and how the attack originated Determine Impact of Attack What exactly needs remediation Identify Patterns of Compromise To identify common bad behaviors Tactically Contain the Threat Isolate the threat on your behalf Determine the Full Scope Identify every endpoint the attack landed on, including what happened in the past Co-Remediation Work with your internal teams to get you back to a known state of good File modifications Cross-process events Registry modifications Watch and Record Everything File executions Copy of every executed binary Network connections esendpoint TELEMETRY File: Access, Modification, Deletion Registry: Access, Modification, Deletion Every Executed Binary Network Connections Cross-process Events Process Creation Thread Creation Inter Process Communication URL 5

FEATURES MONITORING AND VISIBILITY 24x7x365 Coverage: Continuous monitoring of endpoints on and off the network Captures All Activity: Acts as a black box flight recorder continuously recording, centralizing and retaining vital endpoint activity DETECTION, ANALYSIS AND INVESTIGATION Detects and Scopes Cyber-Attacks in Minutes: Active Threat Hunting All endpoint activity that has not been seen before is reviewed by a human analyst Catches Threats Other Technologies Miss Unusual signals are fed into esentire s analytics pipeline and suspicious activity is identified based upon behavioral abnormalities Attack Chain Visualization: Analysts leverage event and forensic information to conduct post-attack forensics that aid in co-managed remediation of affected devices Endpoint Threat Intelligence: Leverages 200+ source feeds and esentire s own Threat Intelligence which is aggregated and correlated daily and delivered automatically to the esendpoint server RESPONSE Rapid Communication: Immediate alerting of both confirmed threats and unusual behaviors or activity Tactical Threat Containment on Your Behalf: Host isolation is performed on your behalf by locking down and isolating compromised endpoints to prevent lateral spread Forensic Investigation: Detailed analysis is performed on the attack to understand the who, what, where, when and why to enable focused remediation efforts Co-Managed Remediation: Analysts provide co-managed remediation until the threat actor is completely eliminated MANAGEMENT AND SUPPORT No Maintenance: esentire provides and maintains the hardware and technology Portal and Reporting: Weekly Alert Reports and Security Portal Dashboard are available for continuous process improvement and visibility Quarterly Business Review: esentire Customer Engagement Team reviews the alerts and findings/ advisories of the last quarter for continued process improvement Device and System Support: Secures Mac, Linux and Windows devices for local and remote users with no performance impact to the endpoints 6

ESENTIRE VS. OTHER SECURITY PROVIDERS Other MDR esentire MDR 24x7 continuous monitoring, recording and centralizing activity Limited Detection utilizing signatures and IOCs Detection of unknown leveraging patterns and behavioral analytics Limited Active threat hunting Full forensic analysis to confirm threat and eliminate false positives Alerting of suspicious behavior Limited Requires a IR Retainer Limited Alerting of confirmed threats Tactical threat containment on client s behalf via host isolation to stop lateral spread Remediation recommendations Full support until incident is remediated and threat actor is eliminated Requires an IR Retainer MAKE THE CASE FOR esendpoint Active Threat Hunting We assume all endpoint signals are potentially malicious and proactively hunt for the needle in the haystack. Elimination of False Positives We support your team by ensuring alerts and responses are directed to the threats that matter. Threat Intelligence We integrate intelligence from our Managed Detection and Response (MDR) platform that detects threats that bypass traditional controls and distribute proactive measures to all esendpoint clients. Machine Learning and Behavioral Analytics We ensure you re protected against that go beyond signatures using advanced analytics that are not part of standard endpoint detection solutions. Economies of Scale and Endpoint Experts We analyze tens of thousands of endpoints every day and continuously train our experts on the latest TTPs used by attackers to bypass traditional controls. Better Together We correlate both endpoint and network information during investigations to reveal the full picture of what happened and deliver timely and focused incident response. 7

esendpoint IN ACTION An Adversary on the Network For one of esentire s clients, technology wasn t enough to stop a targeted threat actor from infi ltrating its network. With the help of esentire Managed Detection and Response and a team of dedicated security analysts and experts, one esentire client narrowly avoided an adversary attack. Read the full report In the Nick of Time In March 2017, a new client employed esendpoint powered by Carbon Black. Within the fi rst three days, our Security Operations Center (SOC) was alerted of an endpoint breach. Read the full report Vawtrak Banking Troan An esentire client experienced the value of esnetwork and esendpoint fi rsthand when the esentire Security Operations Center (SOC) detected abnormal activity on an individual s computer and quickly took action to investigate. Read the full report NEXT STEPS Put esentire MDR to the test Learn more about esentire Advisory Services Learn more about esentire MDR Access free cybersecurity tools and resources esentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber- that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $5 trillion in corporate assets, esentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @esentire.