Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.
The program, called the Carbon Black Integration Network (CbIN), is powered by Carbon Black’s own open APIs and its Cb Predictive Security Cloud PSC.
“The Carbon Black Integration Network was built on the premise that a collective defence strategy is the foundation of any good security posture,” explains Carbon Black director of technology alliances, Jim Raine.
By integrating solutions across each security stack, every new addition brings new functionality to a customer’s entire security architecture. Security teams gain immediate insight and quickly derive more value from existing security investments. We’ll continue to empower our entire ecosystem by adding integrations so companies can easily adopt and use solutions that fit their specific needs.”
Juniper Networks, LogRhythm, and Phantom have all signed up to the CbIN network, and they have also leveraged Carbon Black’s open APIs to build ‘productised integration’ with the PSC.
The network also includes more than 80 technology partners that have built more than 120 supported integrated through Carbon Black’s open APIs.
"LogRhythm and Carbon Black are empowering security teams to identify behavioural anomalies, detect internal and external threats, and prioritise responses utilising enterprise-class security analytics that leverage machine learning and advanced scenario modeling," says LogRhythm VP of marketing and business development, Matt Winter.
Carbon Black believes that security teams face problems including a lack of technical expertise, limited visibility across the security stack, and a rising volume of cyber attacks.
It also believes that the CbIN API could help to alleviate some of those challenges by providing a network of pre-integrated solutions. That same API can also help people build their own integrations.
"By integrating with the Cb Predictive Security Cloud (PSC), LogRhythm provides security teams with complete visibility across their cloud and physical IT environments for faster, more efficient threat detection and response,” Winter continues.
Examples of open-source integrations so far include:
- Exporting all process execution and endpoint network connection events through the real-time Event Forwarder - Sending all Carbon Black data to another storage mechanism such as Hive or Hadoop - Scanning all collected binaries against Yara signatures - Performing standard queries, but process the data in a script to output it in a certain way to support reporting, period queries, enriched process trees, etc. - Consuming threat indicators from CRITS - A watchlist-sharing framework - Subscribing to network connections and plot them on a world map.
Phantom continues to innovate with new capabilities aimed at simplifying integration with enterprise environments while making data more readily available to SOC analysts and reducing mean time to resolution,” adds Phantom VP of business development, Rich Hlavka.
Integrations are available on the Carbon Black GitHub repository.