Story image

Carbon Black announces enhanced cloud security offering

11 Oct 2018

Endpoint security solutions provider Carbon Black has introduced Cb ThreatHunter, delivering new threat hunting and incident response (IR) capabilities on the Cb Predictive Security Cloud (PSC).

The new offering will be the fourth service delivered on the PSC this year.

The Cb ThreatHunter announcement was made from the company’s annual user conference #CbConnect18 in New York.

Carbon Black chief executive officer Patrick Morley says, “A year ago, we outlined our vision to extend the Cb Predictive Security Cloud to make it easier for our customers to move off legacy antivirus and address multiple security use cases through a single cloud platform and sensor.”

“With the addition of Cb ThreatHunter, this platform will have five offerings and delivers customers the ability to prevent, detect, respond to, predict, and now hunt threats in the cloud using a single agent, console and platform.”

Adding advanced threat hunting to the PSC

Cb ThreatHunter is delivered through the PSC, Carbon Black’s endpoint protection platform that consolidates multiple critical endpoint security capabilities supporting both IT and security operations, including: next-generation antivirus (NGAV), endpoint detection and response (EDR); threat hunting and IR; virtualised data centre security; real-time endpoint query and remediation; and managed threat hunting and triage.

Threat hunting powered by a continuous collection of unfiltered data

Most EDR and IR tools on the market collect a limited set of historical data.

As a result, security operation centres (SOCs) and IR teams struggle to get their hands on the information they need to investigate, proactively hunt and remediate.

Cb ThreatHunter solves this problem by continuously collecting unfiltered data, giving security teams all the information they need t proactively hunt threats, uncover suspicious behaviour, disrupt active attacks, repair damage quickly and address gaps in defences.

Investigations that often take days or weeks can be completed in minutes with Cb ThreatHunter.

Some the Cb ThreatHunter features include:

Better search fields: Cb ThreatHunter equips security teams with the ability to flexibly hunt threats, even if an endpoint is offline. With this level of visibility, researchers can see what happened at every stage of an attack with intuitive attack-chain visualisations, and uncover threats, while minimising attacker dwell time. This insight provides immediate answers with comprehensive behavioural context to stop attacks as quickly as possible.

Threat intelligence matching: Cb ThreatHunter’s detection combines custom and cloud-delivered threat intel, automated watchlists and integrations with the rest of the security stack to efficiently scale hunting across the enterprise. This level of detection allows security teams to proactively explore environments for abnormal activity, leverage cloud-delivered threat intelligence and automate repeat hunts. Additionally, the PSC’s platform extensibility allows developers to create custom watchlists to power real-time detection and correlate data across the security stack.

Elastic cloud scalability: Cb ThreatHunter is natively built on the PSC, allowing security teams to rapidly deploy and scale the solution across their enterprise without investing in (or maintaining) on-premise infrastructure. By eliminating these costs and processes, Cb ThreatHunter enables teams to simplify their operations and focus their energy on hunting and responding to threats.

Cb ThreatHunter will be generally available in November 2018.

Five things MSPs need to keep in mind in 2019
A Datto APAC channel exec outlines the most important factors for MSP to being paying attention to in the coming year.
Survey: IT pros nostalgic over on-prem data centre visibility
There are significant security and monitoring challenges faced by IT staff responsible for managing public and private cloud deployments.
61% of CIOs believe employees leak data maliciously
Egress conducted a survey to examine the root causes of employee-driven data breaches, their frequency, and impact.
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Sonatype and HackerOne partner on open source vulnerability reporting
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
OutSystems and Boncode team up for better code analysis
The Boncode and OutSystems alliance aims to help organisations to build fast and feel comfortable that the work they're delivering is at peak quality levels.
Nozomi and RIoT to deliver advanced ICS security solutions to Australia
''As a specialised integrator of robust and resilient ICT and IoT solutions within Australia, we are delighted to be partnering with Nozomi Networks."
Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.