One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 593176
Date de publication 2018-04-17 18:00:00 (vue: 2018-04-17 21:03:08)
Titre New! Free Threat Hunting Service from AlienVault – OTX Endpoint Threat Hunterâ„¢
Texte 70% of successful security breaches start on endpoint devices, according to IDC.1 Yet, security practitioners haven’t had an effective or low-cost way to hunt for threats against critical endpoints. Until now. Today, I am excited to announce a new free service for endpoint threat scanning—OTX Endpoint Threat Hunter™. OTX Endpoint Threat Hunter is a free threat-scanning service in Open Threat Exchange that allows you to detect malware and other threats on your critical endpoints using OTX threat intelligence. This means that you can now harness the world’s largest open threat intelligence community to assess your endpoints against real-world attacks on demand or as new attacks appear in the wild—all. for. free. Powered by the AlienVault Agent, based on osquery, OTX Endpoint Threat Hunter scans your endpoints for the presence of known IoCs, alerting you to any active threats. This free service is the first of its kind to natively take advantage of the over 19 million IoCs contributed to OTX daily by a global community of 80,000 security researchers and practitioners. Get started with OTX Endpoint Threat Hunter > Why did we decide to pack all of that threat intelligence power into an endpoint-focused threat hunting service? Well, until now, security practitioners have had limited options to help them hunt for threats on endpoints: either procure an expensive endpoint threat detection and response (EDR) solution or take a DIY route with an open-source agent. As an alternative, OTX Endpoint Threat Hunter uses the same agent-based approach as expensive endpoint security tools, giving you threat visibility of your critical endpoints without the cost and complexity of introducing yet another security tool to your stack. With a DIY approach, it can be difficult to deploy an open-source tool, to know what to query, and to correlate this information with the latest threat data. OTX Endpoint Threat Hunter removes this complexity and guesswork while providing a free security service available to all. How OTX Endpoint Threat Hunter Works We’ve made it fast and simple to get started with OTX Endpoint Threat Hunter. With its direct integration in OTX, you can get started with OTX Endpoint Threat Hunter without the use of other security tools, so there’s no integration required. Here’s how: If you haven’t already, register with the Open Threat Exchange (OTX). It’s free to join. Download and install the AlienVault Agent on the Windows or Linux devices* you want to monitor. The AlienVault Agent is immediately ready to find threats. Launch a query on any endpoint from OTX by selecting a pre-defined query that looks for IOCs in one or more OTX pulses. The AlienVault Agent executes the query, and within moments you can view the results of the query display across all your endpoints on a summary page within OTX. Get started with OTX Endpoint Threat Hunter now > Threat Hunting Scenarios Let’s look at few threat hunting scenarios that you can perform with OTX Endpoint Threat Hunter. 1.Identify whether your endpoints have been compromised in a major malware attack. Maybe you’ve faced this scenario. The mainstream media outlets are breaking news of a global attack on the rise, taking down businesses and critical infrastructure in droves. Your C-suite urgently wants to know whether the organization is at risk. Do you have the resources and technologies in place to readily hunt for indicators of compromise across your environment, including your endpoints? Do you know which IoCs to hunt for and where to source them? Twitter? Security blogs? That kind of emerging threat research tak
Envoyé Oui
Condensat ‘data ‘request 2016 access access’ agent alienvault anywhere anywhere’s button can capability clicking currently customers detection directly early effective endpoint endpoints feature found free from hunterâ„¢ hunting idc implementing incident interface investigation inviting item join menu money monitor monitoring new otx party program request saves service sources’ submit third threat through tool under using usm which within without your
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: