Story image

Carbon Black launches tech partner program to improve collective security defences

04 Apr 2018

Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.

The program, called the Carbon Black Integration Network (CbIN), is powered by Carbon Black’s own open APIs and its Cb Predictive Security Cloud PSC.

“The Carbon Black Integration Network was built on the premise that a collective defence strategy is the foundation of any good security posture,” explains Carbon Black director of technology alliances, Jim Raine.

By integrating solutions across each security stack, every new addition brings new functionality to a customer’s entire security architecture. Security teams gain immediate insight and quickly derive more value from existing security investments. We’ll continue to empower our entire ecosystem by adding integrations so companies can easily adopt and use solutions that fit their specific needs.”

Juniper Networks, LogRhythm, and Phantom have all signed up to the CbIN network, and they have also leveraged Carbon Black’s open APIs to build ‘productised integration’ with the PSC.

The network also includes more than 80 technology partners that have built more than 120 supported integrated through Carbon Black’s open APIs.

"LogRhythm and Carbon Black are empowering security teams to identify behavioural anomalies, detect internal and external threats, and prioritise responses utilising enterprise-class security analytics that leverage machine learning and advanced scenario modeling," says LogRhythm VP of marketing and business development, Matt Winter.

Carbon Black believes that security teams face problems including a lack of technical expertise, limited visibility across the security stack, and a rising volume of cyber attacks.

It also believes that the CbIN API could help to alleviate some of those challenges by providing a network of pre-integrated solutions. That same API can also help people build their own integrations.

"By integrating with the Cb Predictive Security Cloud (PSC), LogRhythm provides security teams with complete visibility across their cloud and physical IT environments for faster, more efficient threat detection and response,” Winter continues.

Examples of open-source integrations so far include:

- Exporting all process execution and endpoint network connection events through the real-time Event Forwarder
- Sending all Carbon Black data to another storage mechanism such as Hive or Hadoop
- Scanning all collected binaries against Yara signatures
- Performing standard queries, but process the data in a script to output it in a certain way to support reporting, period queries, enriched process trees, etc.
- Consuming threat indicators from CRITS
- A watchlist-sharing framework
- Subscribing to network connections and plot them on a world map.

Phantom continues to innovate with new capabilities aimed at simplifying integration with enterprise environments while making data more readily available to SOC analysts and reducing mean time to resolution,” adds Phantom VP of business development, Rich Hlavka.

Integrations are available on the Carbon Black GitHub repository.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.