Charles Leaver – A Lightweight Solution For The Security And Protection Of Your Endpoints

Charles Leaver Ziften CEO Presents A Post By CTO David Shefter

If you are a company with 5000 or more workers, it is likely that your IT Security and Operations groups are overwhelmed with the degree of data they need to sift through for simply a small amount of visibility about what their users are doing on a recurring basis. Antivirus suites have actually been implemented and they have shut off USB ports and even enforced user access restrictions, but the risk of cyber attacks and malware problems still exists. What action do you take?

Up to 72% of advance malware and cyber criminal invasions take place in the endpoint environment, so says a Verizon Data Breach Report. Your company has to ask itself how important its credibility is first. If you take Target as an example, it cost them over $ 6 Billion in market cap loss due to a malware infiltration. Unfortunately the modern world positions us continuously under attack from dissatisfied or rogue staff members, anarchists and other cyber bad guys. This situation is just likely to get worse.

Your network is secured by a firewall etc however you are unable to see exactly what is taking place past the network switch port. The only real method to address this risk is by enacting a solution that works well with and compliments existing network based solutions that you have. Ziften (which is Dutch for “To Sift”) can provide this solution which provides “Open Visibility” with a light-weight approach. You need to manage the whole environment which includes servers, the network, desktops etc. But you do not want to place additional overheads and stress on your network. A considerable Ziften commitment is that the solution will not have an adverse influence on your environment, but it will provide a deeply impactful visibility and security solution.

The revolutionary software from Ziften absolutely understands machine behavior and problems, permitting experts to zoom in on sophisticated risks quicker to decrease dwell time to a minimum. Ziften’s solution will continuously monitor activity at the endpoint, resource consumption, IP connections, user interactions etc. With the Ziften solution your organization will be able to identify faster the origin of any infiltration and repair the problem.

It is a lightweight solution that is not kernel or driver based, minimal memory usage, there is little to no overhead at the system level and practically zero network traffic.

For driver and kernel based solutions there are intense accreditation requirements that can take longer than nine months. By the time the brand-new software is developed and baked, the OS could be at the next version of release. This is a time consuming, non-supportable and troublesome procedure.

The Ziften approach is a real differentiator in the marketplace. The application of an extremely lightweight and non intrusive agent as well as executing this as a system service, it gets rid of the tensions that many new software application solutions introduce at the endpoint. Ease of implementation results in faster times to market, easy support, scalability, and simple solutions that do not hamper the user environment.

To sum up, with the current level of cyber risks and the risks of a cyber attack increasing daily that can significantly stain your credibility, you have to execute continuous monitoring of all your endpoint gadgets 24/7 to make sure that you have clear visibility of any endpoint security dangers, gaps, or instabilities and Ziften can deliver this to you.


These 5 Cyber Readiness Items Will Provide Security From Cyber Attacks – Charles Leaver

Presented by Charles Leaver, Chief Executive Officer Ziften Technologies – Written By Dr Al Hartmann

1. Security Operations Center (SOC).

You have a Security Operations Center established that has 24/7 coverage either in company or outsourced or both. You do not want any spaces in cover that could leave you open to intrusion. Handovers have to be formalized between watch supervisors, and proper handover reports offered. The supervisor will offer a summary each day, which details any attack detections and defense countermeasures. If possible the cyber crooks should be identified and differentiated by C2 infrastructure, attack method etc and codenames given to these. You are not attempting to attribute attacks here as this would be too tough, however just keeping in mind any attack activity patterns that correlate with different cyber lawbreakers. It is very important that your SOC familiarizes themselves with these patterns and have the ability to separate hackers or perhaps find new attackers.

2. Security Supplier Support Preparedness.

It is not possible for your security workers to understand about all elements of cyber security, nor have knowledge of attacks on other organizations in the same market. You need to have external security assistance groups on standby which might include the following:.

( i) Emergency situation response group support: This is a short list of providers that will react to the most severe of cyber attacks that are headline material. You should ensure that one of these suppliers is ready for a significant risk, and they need to receive your cyber security reports on a regular basis. They need to be legal forensic capable and have working relationships with law enforcement.

( ii) Cyber risk intelligence assistance: This is a vendor that is gathering cyber risk intelligence in your sector, so that you can take the lead when it concerns threats that are developing in your sector. This team must be plugged into the dark net trying to find any signs of you organizational IP being mentioned or chats between hackers discussing your organization.

( iii) IoC and Blacklist support: Since this involves multiple areas you will need multiple suppliers. This includes domain blacklists, SHA1 or MD5 blacklists, IP blacklists, and signs of compromise (suspect config settings, registry keys and file paths, etc). It is possible that a few of your implemented security services for network or endpoint security can supply these, or you can select a third party specialist.

( iv) Support for reverse engineering: A vendor that focuses on the analysis of binary samples and provides in-depth reports of content and any possible hazard and also the family of malware. Your present security vendors might provide this service and focus on reverse engineering.

( v) Public relations and legal assistance: If you were to suffer a major breach then you have to make sure that public relations and legal assistance are in place so that your CEO, CIO and CISO do not end up being a case study for those studying at Harvard Business School to learn more about how not to handle a significant cyber attack.

3. Inventory of your assets, classification and preparedness for security.

You have to guarantee that of your cyber assets are subject to an inventory, their relative values classified, and implemented value proper cyber defences have actually been enacted for each asset category. Do not rely totally on the assets that are known by the IT group, employ a business unit sponsor for asset identification particularly those concealed in the public cloud. Also ensure key management procedures remain in place.

4. Attack detection and diversion preparedness.

For each one of the significant asset classifications you can produce reproductions using honeypot servers to tempt cyber lawbreakers to infiltrate them and reveal their attack approaches. When Sony was infiltrated the hackers discovered a domain server that had a file called ‘passwords.xlsx’ which consisted of cleartext passwords for the servers of the business. This was a great ruse and you must utilize these techniques in enticing locations and alarm them so that when they are accessed alarms will sound right away suggesting that you have an instant attack intelligence system in place. Change these lures typically so that they appear active and it doesn’t appear like an apparent trap. As the majority of servers are virtual, hackers will not be as prepared with sandbox evasion techniques, as they would with client endpoints, so you might be fortunate and in fact see the attack taking place.

5. Monitoring preparedness and constant visibilities.

Network and endpoint activity should be kept track of continually and be made visible to the SOC team. Due to the fact that a great deal of client endpoints are mobile and therefore beyond the organization firewall software, activity at these endpoints should likewise be monitored. The monitoring of endpoints is the only certain approach to perform process attribution for monitored network traffic, due to the fact that protocol fingerprinting at the network level can not constantly be relied upon (it can be spoofed by cyber crooks). Data that has been kept track of must be conserved and archived for future referral, as a number of attacks can not be determined in real time. There will be a requirement to trust metadata more frequently than on the capture of full packets, because that enforces a significant collection overhead. However, a number of dynamic threat based monitoring controls can afford a low collection overhead, and also respond to significant dangers with more granular observations.