Posts

Showing posts from May, 2022

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business

Image
  As an MSSP, being proactive in your approach to   cybersecurity   is a best practice.  Ensuring that your customers are doing their part to update and patch their systems is critical.  If you can integrate your asset management with your   SOC/XDR platform   there are huge gains to be realized. Scanning all your customer environments is the first step.  This can be done with many different vendors, but one that our partners like to leverage is  CYRISMA .  Partners primarily scan for compliance requirements, but it should be done regularly for all clients.  Once that information is collected there are several key steps to take: Review the scan to ensure all relevant assets have been included – this is a key step if customers forget to let you know when they add additional systems. Review the posture of the systems for devices that require updates. Develop a list of required updates and set a timeline. Build a closed loop process to...

Open XDR In the Real World – Q&A With Jon Mayled

Image
  In this interview, we capture real-world experience and recommendations from an enterprise that implemented  Stellar Cyber’s   Open XDR platform . We talked with Jon Mayled, International IT and Security Director at PlastiPak Packaging, Inc., about what he learned during his implementation. SC: What is required to implement a successful XDR program? JM:  Although I recommend a fundamental understanding of the technical environment and key information exchanges between endpoints for implementation of a successful  XDR  program, it’s not an absolute prerequisite. What you will need is a functional understanding of core technical concepts to propel the deployment and utilization of an  XDR solution . This includes a strong foundation in networking concepts, a broad understanding of API integration, and a comprehension of log file analysis and interpretation. SC: What are the challenges in implementing XDR? JM:  With the implementation of any networ...

Keys to a Successful XDR Implementation

Image
  Cybersecurity  protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or context only creates irrelevant noise that frustrates and distracts analysts. Without an integrated platform to correlate all that data, security teams become buried in an overwhelming amount of false alerts.  XDR  is specifically designed to incorporate multiple security engines that correlate and evaluate normalized data sets stored in a lightweight data lake. With many security engines at work (including  Threat Intelligence ,  User Behavioral Analytics , IDS, File Sandboxing, and Machine Learning-based anomaly  detection ), it becomes possible to correlate all telemetry. In addition, you can accurately score a potential incident within seconds by considering everything that is known about the system, asset, or account. XDR Implementation Challenges From our experience at CyFlare, there are several chall...