solution overview€¦ · getting detected by traditional security solutions. sophisticated malware...

2
Network Sentry WHAT WHO Automated Threat Response Suspicious web content File download Unusual C&C traffic Compromised endpoint Advanced Threat Detected WHEN WHERE Bradford Networks and Cyphort Solution Overview The widespread adoption of disruptive IT trends such as mobility, virtualization and cloud has expanded the attack surface and diminished the network perimeter of an organization. These long-term trends have made it easier for cyber adversaries to design sophisticated malware that can infiltrate corporate networks, engage in reconnaissance activities such as lateral movement and credentials stealing, and exfiltrate sensitive corporate data without getting detected by traditional security solutions. Sophisticated malware tends to traverse different domains of IT management – security, networking, and endpoints – making it a cross-functional challenge to correlate the silos of information, and rapidly contain a compromised endpoint in the event of a cyber breach. The traditional threat response process requires significant manual intervention and expertise to trace and contain the threat’s electronic foothold. Cyphort and Bradford Networks have partnered to automate the complex threat triage and response process to reduce threat containment time following a cyber breach. Cyphort’s network-based Adaptive Detection Fabric (ADF) leverages machine learning and behavioral analysis to provide best protection from advanced, otherwise undetectable threats. Bradford Networks’ Network Sentry leverages its unique Live Inventory of Network Connections (LINC) to enhance fidelity of security events from Cyphort by correlating device, user, application and connections information to the compromised endpoint. With this integrated offering, organizations can minimize the risk associated with exposure of digital assets and intellectual property, protect brand equity, and limit the cost of cyber breaches. Security Event Correlation, Triage and Response SOLUTION BRIEF

Upload: others

Post on 29-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Solution Overview€¦ · getting detected by traditional security solutions. Sophisticated malware tends to traverse different domains of IT management – security, networking,

www.bradfordnetworks.com © 2016 Bradford Networks. All rights reserved

Network SentryWHAT

WHO AutomatedThreatResponse

Suspic

ious

web

conten

t

Filedownload

Unusual C&C traffic

Compromisedendpoint

AdvancedThreat Detected

WHEN

WHERE

Bradford Networks and Cyphort

Solution Overview

The widespread adoption of disruptive IT trends such as mobility, virtualization and cloud has expanded the attack surface and diminished the network perimeter of an organization. These long-term trends have made it easier for cyber adversaries to design sophisticated malware that can infiltrate corporate networks, engage in reconnaissance activities such as lateral movement and credentials stealing, and exfiltrate sensitive corporate data without getting detected by traditional security solutions.

Sophisticated malware tends to traverse different domains of IT management – security, networking, and endpoints – making it a cross-functional challenge to correlate the silos of information, and rapidly contain a compromised endpoint in the event of a cyber breach. The traditional threat response process requires significant manual intervention and expertise to trace and contain the threat’s electronic foothold. Cyphort™ and Bradford Networks™ have partnered to automate the complex threat triage and response process to reduce threat containment time following a cyber breach. Cyphort’s network-based Adaptive Detection Fabric (ADF) leverages machine learning and behavioral analysis to provide best protection from advanced, otherwise undetectable threats. Bradford Networks’ Network Sentry leverages its unique Live Inventory of Network Connections (LINC) to enhance fidelity of security events from Cyphort by correlating device, user, application and connections information to the compromised endpoint.

With this integrated offering, organizations can minimize the risk associated with exposure of digital assets and intellectual property, protect brand equity, and limit the cost of cyber breaches.

Security Event Correlation, Triage and Response

SOLU

TIO

N B

RIEF

Page 2: Solution Overview€¦ · getting detected by traditional security solutions. Sophisticated malware tends to traverse different domains of IT management – security, networking,

Bradford Networks and Cyphort Solution Brief 2

How it Works

Cyphort’s SmartCore analytics engine continuously collects web, email, and lateral spread traffic, then employs a comprehensive, multi-stage data analysis using machine learning, behavioral analysis, and other techniques to correlate data from multiple sources and accurately identify previously undiscovered mali-cious content. Information is prioritized based on the severity of risk, areas targeted within the network, and the threat’s progress in executing its mission. Network Sentry ingests security event information from Cyphort’s SmartCore, and applies contextual awareness: device profile, ownership, installed appli-cations and attempted network connections. Based on the severity and business criticality of an event, Network Sentry then triggers an automated workflow and threat response which can include termination of connection, adjustment of access control, SMS and email notifications or quarantine of the endpoint in a specific VLAN for remediation.

Highlights• Enable rapid triage of security events and auto-

mated threat response to reduce containment time from days to seconds

• Bridge the gap between the SOC and NOC with automated workflows

• Gauge severity and business criticality of security events to determine appropriate threat response

• Isolate, restrict, or block compromised endpoints from the network in real-time

• Dynamically control network access for every user and device based on its security posture

• Leverage live and historical inventory of network connections to trace additional points of compromise

374 Congress Street, Suite 502 Boston, MA 02210, USAToll Free +1 866.990.3799 Phone +1 603.228.5300

Copyright © 2017 Bradford Networks. All rights reserved. Printed in USA. Bradford Networks and Network Sentry are trademarks of Bradford Networks in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. 16284-SB-C

BRADFORD NETWORKS is leading the transformation of network security by providing visibility, control and response to minimize the risk and impact of cyber threats. The company’s patented Network Sentry solution continuously assesses the risk of every user and endpoint, and automatically contains compromised devices that act as backdoors for cyber criminals. The company’s award-winning Network Sentry is used by more than 1000 organizations worldwide across many market sectors, including financial institutions, government and defense, healthcare, education, logistics and transportation, media and entertainment, retail and hospitality, technology, utilities and many others. For more information, please visit www.bradfordnetworks.com.

5451 Great America Pkwy, Suite 225 Santa Clara, CA 95054, USAToll Free +1 855.862.5927 Phone +1 408.841.4665

CYPHORT, INC. is a network security company providing mid- and large-size enterprise customers with the innovative Adaptive Detection Fabric, a scalable software solution designed to integrate with existing security tools to discover and contain the advanced threats that bypass the first line of security defense in an organization. Based in Santa Clara, California, the company was founded in 2011 and distributes its software through direct sales and channel partners across North America and international markets. Learn more at www.cyphort.com

2 3

4

1B

1A SmartCore scans web traffic (internet & lateral) and detects malicious downloads & CNC communications

SmartCore generates security event consumed by Network Sentry

SmartCore scans email and detects malicious attachments & bad URLs

SmartCore automatically updates the rules on the firewall to block CNC traffic

Network Sentry prioritizes security event & orchestrates threat response

User

CorporateNetwork

SmartCore

Internet Firewall(Top 10 vendors)Network Sentry

EmailServer