Emergency Incident ResponseReport a Confirmed or Potential Breach? Call +1 770-870-6343
0 Results Found
              Back To Results

                Cyber Intelligence: Understanding the Value and Application

                Understanding the value of threat intelligence

                Organizations like yours must decide where to invest finite resources for security solutions and applied analytics.

                Enterprise executives are also interested in quantifying and measuring the value of threat intelligence and security controls.

                We understand this attention to ROI and the challenges of justifying results. Secureworks demonstrates the proof of what we deliver in terms of threat detection that enhance your product vendor solution and investment. Continued innovation in our attacker database paid off by detecting new and evolving Ransomware that initially evaded security controls

                In this video, Ben Feinstein, Director of Operations & Development of our Counter Threat Unit, outlines how we quantify and measure the value of threat intelligence as he demonstrates advanced countermeasures via an actual client scenario.

                What You Will Learn:

                • Understand the value and application of threat intelligence from Secureworks
                • How to protect and enhance your investment in existing product platforms
                • Learn about our threat intelligence in action with complementary vendors


                In terms of quantifying or measuring the value of our intelligence, we do this internally through looking at how many incidents, or how many, cyber-attacks we are detecting the application of our intelligence. So we are able to slice and dice our data and telemetry looking at what’s being detected by vendor security controls, third-party security detections, and what’s being detected by our own intelligence, our own platforms. And so what we find is that the addition of our intelligence on these platforms definitely raises the bar into it detects additional security incidents.  And oftentimes we’re able to proactively block and prevent those incidents from occurring in the first place.

                The Proof

                Really, the proof is in the service we deliver, and so as a managed security services client of ours, we’re are able to do some comparisons and look at what product vendors are detecting, you know where we’re monitoring, or managing that security control. And then look at what’s being detected and blocked based on the application of SecureWorks’ own intelligence on top of those platforms.

                Our Intelligence in Action

                For several years, SecureWorks has offered the attacker database service, which is a set of threat data feeds and APIs that allows our clients to directly consume our threat indicators intelligence. So in July 2016, I was very excited when we announced the integration of our attacker database data feeds with the Palo Alto networks next-generation firewall platform. So what we’ve done with this, is that we’ve leverage some functionality on the Palo Alto next GEN firewall platform that supports dynamic external block lists. And what we’re doing, is we’re automatically feeding those block lists with our attacker database data feeds. We’re proactively able to block malicious network activity based on the IP addresses, host names, domain names that we know to be malicious through our own intelligence.

                And so in this case, a Ransomware delivery was able to evade the security controls that were in place. However, through the application of our threat intelligence on top of the Palo Alto platform, we detected and blocked communication back to the command-and-control node that was used by this ransomware family.

                We generate around 2 billion events each month. With Secureworks, we are able to crunch down that number to 20-30 high fidelity alerts — and that makes my team's job much easier.
                Sunil Saale, Head of Cyber and Information Security, Minter Ellison
                Red Cloak™ Threat Detection and Response isn’t just the next generation of SIEM, it’s an evolution.
                David Levine, CISO, Ricoh Group

                Why Secureworks®?

                The old approaches to cybersecurity are no longer adequate. It’s time for something new. Layered defenses can create almost as many problems as they solve, and security teams struggle to keep up with the threat. What you need is context across all your layers of defense with the right people, processes, and technology working together in concert. That’s how Secureworks can help. Using 20+ years of industry knowledge, advanced analytics, industry-leading threat intelligence, and the network effect of more than 4,000 customer environments, we provide world-class cybersecurity solutions to customers around the globe. This unmatched experience empowers our customers to be Collectively Smarter. Exponentially Safer.™

                Our Managed Detection and Response (MDR) solution is comprehensive, powered by our cloud-native software Red Cloak™ Threat Detection and Response that uses AI and machine learning to deliver better outcomes for your security operations. MDR unifies telemetry from your existing security technology to maximize visibility, reduce complexity, and enable you to move at the speed of the threat. Learn more about how Managed Detection and Response uses contextualized visibility to improve your organization’s security posture.

                Related Content