Endpoint

1/22/2018
06:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secdo Announces Automated Endpoint Security, Incident Response Capabilities for Mac OS

NEW YORK, NY — (January 17, 2018) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced support for the Apple Mac operating system, including Mac OS 10.13 High Sierra. Secdo’s innovative approach brings a number of long-awaited firsts among endpoint detection and response providers who lack feature parity for organizations faced with growing numbers of Mac users. Combining the only thread-level visibility on the market today with a unique behavior based assisted learning engine, Secdo is the only solution to automatically detect new threats and investigate every security alert from any source in seconds, creating a force multiplier for security teams while dramatically improving the operational backlog for discovery and recovery of internal and external threats.

With the addition of the Mac agent, Secdo brings the following innovations to the endpoint detection and response market, including:

  • The first platform with complete feature parity across Windows, Linux and now Mac for threat hunting, detection, forensic investigations and response;
  • The first agent that monitors all activity at the thread-level allowing process threads to be tracked independently providing greater clarity
  • The only platform that retains all endpoint activity for over one hundred days, more than the average dwell time of a breach , while ensuring no usability limitations at scale;
  • The only platform that incorporates Behavioral Indicators of Compromise (BIOCs) for signature-less custom detection of advanced threats based on attack methodology;
  • The only endpoint platform that correlates Mac data with third-party and SIEM security events mapping the attack timeline and reducing alert triage time to seconds; 
  • The only platform that automatically investigates any third party and SIEM security events creating a complete picture of the attack with detailed forensic data and reducing incident investigation time to minutes;
  • The only platform with a scalable response center allowing both live actions (reverse shell, screen capture, task and file manager, etc.) and home-grown utilities to be run remotely, and
  • The only agent/sensor with consistent near zero impact on performance with continuous monitoring and collection.

"Macs had 299 CVE Vulnerabilities in 2017  and opened 2018 with the Intel Spectre vulnerability and MacOS IOHID kernel vulnerability,” said Jason Dettbarn, CEO of Mac management vendor, Addigy. “Top tier security tools like Secdo are integral to protecting against such Zero Day vulnerabilities while we wait for Apple to release a stable patch to protect machines.”

Secdo’s innovative Behavioral Based Indicators of Compromise (BIOC) technology combined with the unique thread-level visibility and the in-built assisted learning engine allows security teams to detect and protect against Mac specific attack methods rather than signatures. 

Applying this capability to the day-to-day activities of security teams is key to creating a proactive defense, Secdo users will create tailor made BIOCs that will uniquely detect and then automatically investigate anomalies and abnormal behaviors found on any endpoint. The result allows security teams to force multiply their efforts in validation, forensic investigation, and scaled response to any threat in seconds rather than weeks, while ensuring the platform will adapt to protect against future attacks.

“Apple’s inroads in the enterprise has resulted in a corresponding security threat that is the cause of great concern for many organizations,” said Gil Barak, CTO and Co-Founder, Secdo. “With a single interface to investigate every security threat for Windows, Linux and Macs, Secdo makes the process of securing these environments fast, simple and highly effective.”

Availability
Secdo Automated Endpoint Security and Incident Response for Mac is available immediately through authorized partners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.