sb-au logo
Story image

Carbon Black launches tech partner program to improve collective security defences

04 Apr 2018

Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.

The program, called the Carbon Black Integration Network (CbIN), is powered by Carbon Black’s own open APIs and its Cb Predictive Security Cloud PSC.

“The Carbon Black Integration Network was built on the premise that a collective defence strategy is the foundation of any good security posture,” explains Carbon Black director of technology alliances, Jim Raine.

By integrating solutions across each security stack, every new addition brings new functionality to a customer’s entire security architecture. Security teams gain immediate insight and quickly derive more value from existing security investments. We’ll continue to empower our entire ecosystem by adding integrations so companies can easily adopt and use solutions that fit their specific needs.”

Juniper Networks, LogRhythm, and Phantom have all signed up to the CbIN network, and they have also leveraged Carbon Black’s open APIs to build ‘productised integration’ with the PSC.

The network also includes more than 80 technology partners that have built more than 120 supported integrated through Carbon Black’s open APIs.

"LogRhythm and Carbon Black are empowering security teams to identify behavioural anomalies, detect internal and external threats, and prioritise responses utilising enterprise-class security analytics that leverage machine learning and advanced scenario modeling," says LogRhythm VP of marketing and business development, Matt Winter.

Carbon Black believes that security teams face problems including a lack of technical expertise, limited visibility across the security stack, and a rising volume of cyber attacks.

It also believes that the CbIN API could help to alleviate some of those challenges by providing a network of pre-integrated solutions. That same API can also help people build their own integrations.

"By integrating with the Cb Predictive Security Cloud (PSC), LogRhythm provides security teams with complete visibility across their cloud and physical IT environments for faster, more efficient threat detection and response,” Winter continues.

Examples of open-source integrations so far include:

- Exporting all process execution and endpoint network connection events through the real-time Event Forwarder - Sending all Carbon Black data to another storage mechanism such as Hive or Hadoop - Scanning all collected binaries against Yara signatures - Performing standard queries, but process the data in a script to output it in a certain way to support reporting, period queries, enriched process trees, etc. - Consuming threat indicators from CRITS - A watchlist-sharing framework - Subscribing to network connections and plot them on a world map.

Phantom continues to innovate with new capabilities aimed at simplifying integration with enterprise environments while making data more readily available to SOC analysts and reducing mean time to resolution,” adds Phantom VP of business development, Rich Hlavka.

Integrations are available on the Carbon Black GitHub repository.

Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Story image
New stalkerware tech wreaking havoc on personal privacy
Stalkerware, which tracks and stalks victims using their own devices, is not a new concept but researchers at Kaspersky have found a new sample of it, which it says supersedes all previously found software. More
Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More
Story image
IT pros fear threats to critical infrastructure, report shows
IT professionals are concerned about operational technology (OT) security and attacks on critical infrastructure, with a number of people saying the responsibility lies with government, according to a new report.More
Story image
Scammers using Bitcoin, sextortion to take advantage of Coronavirus fears
As people's fear and desire to do something about COVID-19 is dominating the news, it is also being exploited in every way by online criminals. More
Story image
Acronis steps up protection offering for businesses
The company aims to provide a secure collaboration environment for remote workers.More