Data received : 11-Oct-2018
Location: Singapore
Reactive defence tactics have become inadequate in this era of undetectable cyber threats. Carbon Black today introduced Cb ThreatHunter, delivering advanced threat hunting and Incident Response (IR) capabilities to support a proactive cybersecurity strategy. Cb ThreatHunter continuously collects unfiltered data, giving security teams all the information they need to proactively hunt threats, uncover suspicious behavior, disrupt active attacks, repair damage quickly and address gaps in defenses. Investigations that used to take days or weeks can now be completed in just minutes.
Most of the existing detection and response solutions in the market only collect historical data, significantly limiting the capabilities of security teams to investigate, proactively hunt and remediate threats. Cb ThreatHunter bridges this gap, empowering security teams with:
Location: Singapore
Reactive defence tactics have become inadequate in this era of undetectable cyber threats. Carbon Black today introduced Cb ThreatHunter, delivering advanced threat hunting and Incident Response (IR) capabilities to support a proactive cybersecurity strategy. Cb ThreatHunter continuously collects unfiltered data, giving security teams all the information they need to proactively hunt threats, uncover suspicious behavior, disrupt active attacks, repair damage quickly and address gaps in defenses. Investigations that used to take days or weeks can now be completed in just minutes.
Cb ThreatHunter Process Tree |
Most of the existing detection and response solutions in the market only collect historical data, significantly limiting the capabilities of security teams to investigate, proactively hunt and remediate threats. Cb ThreatHunter bridges this gap, empowering security teams with:
- Elastic Cloud Scalability: Cb ThreatHunter is delivered through the Cb Predictive Security Cloud (PSC), Carbon Black’s cloud-based endpoint protection platform that consolidates multiple critical endpoint security capabilities supporting both IT and security operations. This allows security teams to rapidly deploy and scale the solution across their enterprise without investing in (or maintaining) on-premise infrastructure, thus simplifying their operations and allowing them to focus on hunting and responding to threats.
- More Powerful Search Fields: Security teams can flexibly hunt threats, even if an endpoint is offline. The solution provides visibility on every stage of an attack with intuitive attack-chain visualizations and uncovers advanced threats, while minimizing attacker dwell time. This insight provides immediate answers with comprehensive behavioral context to stop attacks as quickly as possible.
- Enhanced Threat Intel Matching: The advanced detection capabilities allow security teams to proactively explore environments for abnormal activity, leverage cloud-delivered threat intelligence and automate repeat hunts. Additionally, the PSC’s platform extensibility allows developers to create custom watchlists to power real-time detection and correlate data across the security stack.
Comments