The key to kill chain-based cyber defense is that criminals must infiltrate the entire defense chain to be successful, while defenders need only break one link to stop a cyber thief.
Waltham, MA (PRWEB) June 07, 2013
Security experts at enterprise information protection leader Verdasys say customers are successfully using a defensive strategy known as the "Kill Chain Defense" to guard against Advanced Persistent Threats (APTs) and other targeted and highly sophisticated cyber threats. This approach attempts to disrupt attacks using a combination of technologies to gather and correlate system, application and data events and then quickly respond with advanced containment controls targeting multiple stages in a cyber attack. The strategy is the subject of a new white paper: "Cyber Attack Defense: a Kill Chain Strategy," launching next week at the GARTNER Security & Risk Management Summit, National Harbor, Md., and Forrester's Forum for Security & Risk Professionals EMEA in London. Download the white paper here: http://www2.verdasys.com/verdasys-cyber-threat-whitepaper-PR.
Verdasys is showcasing at both events a new Managed Service for Cyber Defense (MSCD), a kill chain strategy-based solution for cyber attack protection, hosted in a private cloud and managed by Verdasys data security experts.
"Cyber defenses that start at the perimeter of the corporate network and focus on one or possibly two stages in an attack are a prudent first step, but will always fail to catch some exploits," said Jim Ricotta, Verdasys president and CEO. "We know that point products utilized separately do not offer correlated threat intelligence that is actionable in a kill chain defense mode, nor do they arm security teams with the prevention and containment control capabilities needed to effectively win against the well-funded and organized enemies attacking our trade secrets and other sensitive data."
A Kill Chain Defense collects and correlates threat activities, identifying anomalies that signal malware and challenges that malware’s adaptability and stealth from all possible stages of the attack by rapidly deploying containment controls to the stages where the malware is most vulnerable. "Detection and kill capability at each point in the enemy's attack chain results in the highest probability of a successful defense," said Ricotta.
Through its Digital Guardian platform and via managed services, Verdasys provides a comprehensive, integrated kill chain defense for cyber threat that correlates endpoint and network threat information and other suspicious activities to provide an enterprise-wide overview of threatening activity. Digital Guardian then enforces autonomous prevention and containment controls at different stages of an attack on or off the network, thwarting any attempt to remove sensitive data.
Download the new whitepaper, "Cyber Attack Defense: a Kill Chain Strategy," at http://www2.verdasys.com/verdasys-cyber-threat-whitepaper-PR.
Verdasys (http://verdasys.com) provides Enterprise Information Protection solutions and managed services to secure sensitive data and assure the integrity of business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian, a Leader in Gartner’s Magic Quadrant for Content-Aware Data Loss Prevention, is a proven technology platform that provides complete, policy-based data lifecycle monitoring, classification, control and forensics on endpoints and servers, virtual machines and enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyber attacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in manufacturing, pharmaceuticals, high technology, energy, financial services and government.
# # #
Contact: Betsy Kosheff, 413-232-7057 bkosheff(at)verdasys(dot)com