One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 760425
Date de publication 2018-07-31 13:00:00 (vue: 2018-07-31 16:02:31)
Titre Extending Threat Detection to the Endpoint with New EDR Capabilities in USM Anywhere
Texte Back in April, we began to invite USM Anywhere customers to try out our new endpoint agent, the AlienVault Agent, in an Early Access program. The overwhelming interest in the program alone was telling; over 37% of USM Anywhere customers (60% of our MSSP partners) raised their hands to participate. Our conversations with customers during the program were even more telling; Our customers want deeper security visibility of their endpoints without having to manually deploy and administer third-party endpoint agents.  What’s more, they want advanced threat detection capabilities for the endpoint that pick up where their traditional antivirus tools fall short. What we heard from our customers echoes the current conversation in the larger cybersecurity community regarding endpoint security. That is that, today, malicious actors are increasingly targeting the endpoint with attacks designed to evade traditional endpoint prevention and protection tools. Organizations are struggling to keep up, as the enterprise EDR solutions that offer advanced endpoint threat detection are often too complex or expensive for most organizations. USM Anywhere is uniquely positioned to solve for this challenge, as the platform is built to evolve as the threat landscape changes. Its extensible architecture allows us to seamlessly and automatically introduce new security capabilities, integrations, and threat intelligence to the platform, giving our customers comprehensive threat coverage without having to layer on more point security solutions to contend with the latest attacks. Since we first launched USM Anywhere, we’ve been steadily extending its reach to detect modern threats wherever they appear. The endpoint is no exception. Today, I’m pleased to announce the launch of new endpoint detection and response (EDR) capabilities in USM Anywhere. You can read the full press release here. With EDR capabilities delivered as part of the unified platform, USM Anywhere users can centralize security monitoring of their endpoint and network activities across their cloud and on-premises environments, without having to deploy or integrate a separate EDR solution. This not only streamlines security operations, but it also allows users to correlate network and endpoint security data for better threat prioritization and faster incident investigation and response. These capabilities work through the AlienVault Agent, a lightweight, adaptable endpoint agent based on osquery that easily deploys to Windows and Linux endpoints and is easy to manage in USM Anywhere. The feedback we’ve received from USM Anywhere customers in the Early Access program has been positive and has helped to drive the product development leading up to today’s launch and beyond. We asked customers which features or use cases were the most exciting or useful to them. Top responses included: Continuous endpoint monitoring / automated detection of advanced endpoint threats File integrity monitoring (FIM) to help with PCI DSS or other compliance requirements
Envoyé Oui
Condensat #528  what’s 2018 about access across activities actors adaptable add administer advanced agent agents alienvault alienvault’s all allows alone also analysis announce antivirus any anywhere anywhere  appear april architecture are asked attacks automated automatically available back based been began better beyond blackhat blog booth brief  built bulk but can can: capabilities cases centralize challenge changes cloud community complex compliance comprehensive contend continuous conversation conversations correlate coverage current customers cybersecurity data day deeper delivered demo deploy deployment deploys designed detect detection development drive dss during early easily easy echoes edr employees endpoint endpoints engineers enterprise environments essential evade even evolve example exception excited exciting expensive experience  extending extensible fall faster features feedback file fim first forensics free from full get giving hands has having heard help helped here i’m incident included: increasingly info information integrate integrations integrity intelligence interactive interest introduce investigation invite it’s its javvad join keep labs landscape larger latest launch launched layer leading learn lightweight linux live make malicious malik: malware manage management manually minute mission modern modules monitoring more most mssp network new not off offer often only operations organizations osquery other out over overwhelming own part participate partners party pci phenomenal pick platform pleased point positioned positive post  premises press prevention prioritization proactive product products program protection provide purchase querying raised reach read ready real received regarding release remote requirements requiring response responses robust sales seamlessly security see separate short simple since sites sizes solution solutions solve started steadily straightforward streamlines struggling subscriptions targeting telling; them these think third threat threats through today today’s too tools top traditional trial try two unified uniquely upgrade use useful users usm video visibility want watch we’ve what where wherever which why windows without work world yourself
Tags Malware Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: