Story image

Why you need to go beyond SIEM to stay secure

Threat Detection and Response has become a critical concern for today’s security teams so they can defend their organisations from exploitation by advanced threats.

According to the 2018 Trustwave Global Security Report, it takes an average of 83 days to discover a cybersecurity breach. Advanced threats are bypassing traditional security measures and are compromising the integrity of IT environments at an alarming rate.

In response to this trend, a new class of services known as Managed Detection and Response (MDR) have emerged from a growing list of speciality providers and forward-thinking Managed Security Services Providers (MSSP). 

However, as with most emerging services, the challenge is to discover which capabilities best meet the specific needs of each business.

In addition to 24x7x365 monitoring and notification, MDR services employ incident response and remediation capabilities that often include proactive threat hunting.

In essence, MDR is focused on solving the broader challenges of threat detection and response comprehensively, by quickly identifying both known and unknown threats, rapidly validating their presence and spread within an organisation, and then quickly eradicating the threat.

The goal is to reduce the attacker dwell times by short-circuiting the kill chain, minimising any potential damage done and shorten the cycle to remediation.

It is thus important for organisations to combine Managed SIEM with Managed Threat Detection to get greater value and increased resilience.

This is also important as organisations start to shift investment from preventive controls such as firewalls and endpoint protection, as cyber attacks have continued, becoming more sophisticated and harder to detect with point solutions alone.

To learn more about these solutions click here

Key benefits MDR services provide include:

  • Real-time threat intelligence and behavioural analytics to uncover advanced threats which are typically missed by traditional perimeter and endpoint security technologies.
  • Rapid identification and containment of both known and unknown threats, minimising attacker dwell times, significantly reducing time spent on remediation and reimaging activities.
  • Proactive threat hunting techniques to validate the exact nature of the threat as well as its spread across the network or to multiple endpoints for positive containment. 
  • Remote incident investigation and response removing latency at critical phases throughout the process to minimise the damage done and ensure the threat has been fully eradicated so that the business can quickly be returned to steady-state operation.

Trustwave up-levels traditional MSSP competencies like device management and log collection, providing the foundation for organisations to consider more proactive security like endpoint detection and response and proactive threat hunting.

If you want to find out more click here

Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.