Cybereason™ Integrates Lockheed Martin Threat Intelligence, Adds Guided Remediation to its Detection and Response Platform

Leveraging its Unique Relationship with Lockheed Martin, Cybereason Offers Customers Exclusive Access to its Threat Intelligence; Guided Remediation Speeds Response

Feb 29, 2016, 10:00 ET from Cybereason

BOSTON, Feb. 29, 2016 /PRNewswire/ -- Cybereason today announced enhancements to its Endpoint Detection and Response platform. Thanks to its strategic partnership with Lockheed Martin, a Cybereason customer, investor and partner, Cybereason has exclusive access to this previously unavailable threat intelligence, which customers can integrate into the Cybereason platform.  Cybereason's guided remediation capabilities provide security teams with the means to accelerate the process of thwarting identified malicious operations or Malops™.

"We often look to our partners to help shape and create best practices and products, and have been working with Cybereason to do just that," said Angie Heise, vice president, Lockheed Martin Commercial Cyber. "Cybereason's market leading endpoint threat detection and response capabilities complement our cyber security offerings, providing customers a best of breed EDR solution."

Customers that want to benefit from Cybereason's access to Lockheed Martin threat intelligence can choose to have it seamlessly integrated into the Malop Hunting Engine where it provides visibility and detection based on one of the world's most comprehensive intelligence sources. 

How the Cybereason Platform Works:
The Cybereason platform consists of three components: Endpoint Silent Sensors, the Malop Hunting Engine and the Incident & Response Console. The sensors collect data from endpoints and servers and send it to the Malop Hunting Engine, which identifies and connects suspicious activities in order to confirm the presence of a Malop. Cybereason's Incident & Response Console presents the Malop as a visual story of the attack, including information needed to assess, investigate and respond to it. The console delivers important information about the attack including its timeline, root cause, affected endpoints and compromised users, which, along with other data, enables security analysts to act quickly.

Introducing Guided Remediation
Reflecting Cybereason's commitment to usability, its guided remediation capabilities provide a simple and rapid method for analysts to contain and eradicate malicious activities. Security analysts can hit the Remedy Button for single-click remediation of detected threats across all machines including:

  • Kill a process to remotely terminate a process detected on one or more endpoints
  • Quarantine a process to isolate a process for further investigation
  • Delete registry keys

"Our goal when providing automated real time detection is to enable our customers to respond quickly and effectively to confirmed malicious activity," said Ashish Larivee, Vice President of Products, Cybereason. "The remediation steps we offer are crafted to address specific Malop circumstances, applying automation in a way that empowers our customers to be smart, agile defenders. It reflects our belief that while detection should be automated, response depends on situational awareness and requires human judgment."

About Cybereason: 
Founded by members of the Israeli military's elite cyber-security corps, Cybereason's technology is based on their deep understanding of complex hacking operations. The Cybereason Endpoint Detection and Response Platform leverages big data, behavioral analytics and machine learning to automatically hunt down complex cyber attacks in real time. Providing a full visual map of malicious operations, Cybereason provides its customers with immediate visibility to advanced threats inside their network and empowers rapid, effective response. Cybereason is privately held and headquartered in Boston with offices in Tel Aviv, Israel. Its customers include Lockheed Martin, Softbank and other enterprise customers across all verticals worldwide.

SOURCE Cybereason



RELATED LINKS

http://www.cybereason.com