PowerPoint Presentation
File info: application/pdf · 22 pages · 1.85MB
PowerPoint Presentation
Andre von Ameln - Dell Technologies
• manual processes • too many tools • lack of staff 76% Of organizations are finding detection and response either much more or more difficult today than two years ago. Top reasons why respondents say it’s getting more…
Full PDF Document
If the inline viewer fails, it will open the original document in compatibility mode automatically. You can also open the file directly.
Extracted Text
Andre von Ameln 19 September 2019 Internal Use - Confidential Agenda Internal Use - Confidential 01 "Detection & Response" � Where Do You Stand Today? 02 Our Approach 03 Red Cloak Threat Detection & Response 04 MDR Powered by Red Cloak 05 How It Works / Optional Demo 76% Of organizations are finding detection and response either much more or more difficult today than two years ago. Source: ESG Master Survey Results, The Threat Detection and Response Landscape, April 2019 Top reasons why respondents say it's getting more difficult... 34% Say amplified threat volume The remaining 66% say: � increasing workload � enlarged attack surface � manual processes � too many tools � lack of staff This is forcing a few changes... 82% Think improving detection and response is a high priority 89% Are increasing detection and response spending over the next 12-18 months Classification: //Secureworks/Confidential - Limited External Distribution 4 Classification: //SecureWorks/Confidential - Limited External Distribution: Internal Use - Confidential Our Approach: Software-Driven Security We have taken our 20 years of security operations experience, threat intelligence and the most significant technological advancements in the last 5 years to reimagine how security should be done. Threat Intelligence Advanced Analytics & ML Investigations Threat Detection & Response Orchestration Hunting Classification: //Secureworks/Confidential - Limited External Distribution 5 Internal Use - Confidential Internal Use - Confidential A Security Analytics Application for security analysts to: � Detect � Investigate � Respond Designed and built by Security experts with experience solving complex data challenges Classification: //Secureworks/Confidential - Limited External Distribution 6 What Does it Do? Internal Use - Confidential Correlates security-relevant data from endpoint, network, cloud, and business systems Detects both known and unknown threats to protect your environment from a wide range of threats Enriches data with relevant user and asset context to speed sense-making Maps security alerts to MITRE ATT&CK framework Supports collaborative investigations Automates containment and prevention actions Includes Secureworks' market-leading threat intelligence and Red Cloak endpoint agent Internal Use - Confidential D I F F E R E N T I AT I O N Threat Intelligence Network Effect Stay ahead of your Adversaries Advanced Analytics Classification: //Secureworks/Confidential - Limited External Distribution 8 GEOPOLITICAL ANALYSIS Threat Intelligence INVESTIGATIONS THREAT INTELLIGENCE SUPPORT INCIDENT RESPONSE From the Secureworks Counter Threat UnitTM research team UNDERGROUND SURVEILLANCE SOCIAL MEDIA Internal Use - Confidential CUSTOMER EVENTS RELATIONSHIPS MALWARE ANALYSIS BOTNET MONITORING SECURITY BLOGS MAILING LIST WEBSITE SCRAPING Network Effect Over 20 years of attack and threat actor data Over 70 researchers in our Counter Threat UnitTM Over 135 threat groups actively monitored Over 1,000 IR engagements performed last year Over 52,000 unique threat indicators updated daily Thousands of customers across the globe Classification: //Secureworks/Confidential - Limited External Distribution 10 Internal Use - Confidential Ta c t i c Graphs TM Domain Generation Algorithm (DGA) Stolen Credentials Rare Program And Rare IP Punycode Detectors Command & Control Internal Use - Confidential Brute Force Success Login Anomalies Network Countermeasures Endpoint Watchlists Benefits for Your Team 01 Detect Advanced Threats 02 Trust Your Alerts 03 Streamline & Collaborate 04 Automate the Right Action Internal Use - Confidential 73% of organizations have been impacted by the cybersecurity skills shortage Your team uses our software We'll do it for you Internal Use - Confidential Managed Detection and Response POWERED BY 1 Source: ESG Research Publication, The Life and Times of Cybersecurity Professionals, April 2019 Classification: //Secureworks/Confidential - Limited External Distribution 13 Managed Detection and Response POWERED BY 24x7 Software-Driven Service Access to Red Cloak TDR Collaborative Investigations Proactive Threat Hunting Incident Response A 24x7 Threat Detection and Response Unit that Helps You Scale Your Security Operations & Expertise POWERED BY Classification: //Secureworks/Confidential - Limited External Distribution 14 Internal Use - Confidential Managed Detection and Response POWERED BY ENDPOINT NETWORK CLOUD BUSINESS SYSTEMS Detect DETECTORS Detection use cases in Red Cloak TDR leveraging threat intelligence and advanced analytics (machine learning, deep learning, UEBA, statistical analysis) Applied Intelligence Secureworks� Network Effect, Incident Response Findings, Secureworks� CTU� Threat Intelligence Internal Use - Confidential Investigate INVESTIGATION Analyst recommendations provided within the TDR application VALIDATION Analyst investigates leveraging additional context and enrichment Proactive Threat Hunting Threat hunting across our customers by our advanced team of global threat hunters Respond IMMEDIATE ACTIONS Software-driven actions performed by our analysts to contain the threat. INCIDENT RESPONSE Performed by our industry recognized global IR team 24x7 Analyst Access Via in-app Chat, Email, and Phone 15 Solution Features Managed Detection and Response Powered by Red Cloak 24x7 Service Access to Red Cloak TDR Support for AWS, O365, & Azure Event Sources Threat Triage & Prioritization Investigation & Validation Security Expert Assistance Secureworks Executed Containment Remote Incident Response Hours Proactive Threat Hunting Threat Engagement Manager Collaborative Investigation Interface Live Chat Support Agent & Sensor Support Red Cloak Agent Crowdstrike Support Threat Intelligence & Analytics CTU Countermeasures (Cisco and Palo Alto) Red Cloak TDR Analytics Applied Threat Intelligence Internal Use - Confidential Available as Add-Ons iSensor � MDR is priced by # of Endpoints � Subscription based "Unfortunately, many providers without a strong background in incident response have launched MDR services, which will result in disaster when a highprofile incident occurs. Stay away from the pretenders with no bona fides" JEFF POLLARD, APRIL 26 2018 FORRESTER RESEARCH, INC. Forrester Research Inc., Now Tech: Managed Detection And Response (MDR) Services, Q2 2018, Jeff Pollard "In 2018, Secureworks conducted more than a thousand incident response engagements that totaled more than 40,000 professional incident response hours. More than 120 terabytes of investigative data were collected. Secureworks analyzes this data to help organizations plan for, detect, respond to, and recover from cybersecurity incidents." The Secureworks Incident Response Insights Report 2019 Classification: //Secureworks/Confidential - Limited External Distribution 17 Internal Use - Confidential Industry Recognition Internal Use - Confidential Placed in the "Full Scale Forensics" category in Forrester's latest MDR report Forrester Research Inc., Now Tech: Managed Detection And Response (MDR) Services, Q2 2018, Jeff Pollard Classification: //Secureworks/Confidential - Limited External Distribution Industry Recognition Internal Use - Confidential Mentioned as a Representative MDR Provider in Gartner's Market Guide for MDR Services Gartner Inc., Market Guide for Managed Detection and Response Services, Toby Bussa, Kelly M. Kavanagh, Sid Deshpande, Craig Lawson, Pete Shoard, Jul 2019 Mentioned as a Sample Vendor in Gartner's Hype Cycle for Endpoint Security Gartner Inc., Hype Cycle for Endpoint Security, 2019, Dionisio Zumerle, John Girard, Jul 2019 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Classification: //Secureworks/Confidential - Limited External Distribution Scale Your Security Operations & Expertise 01 Detect Advanced Threats 02 Trust Your Alerts 03 Streamline & Collaborate 04 Take the Right Action Internal Use - Confidential Questions? Andre von Ameln Mobile: +49 162 8834460 Email: aameln@secureworks.com Internal Use - Confidential
