Threat Intelligence
2/6/2017
02:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Endpoint Threat Detection and Response Service to Boost WatchGuard's Network Security Suite

New ThreatSync correlation and scoring engine automates malware detection and remediation with real-time data from networks, endpoints and cloud intelligence.

SEATTLE – January 24, 2017WatchGuard® Technologies, a leader in advanced network security solutions, today announced Threat Detection and Response (TDR), a new cloud-based service that gives small and midsize businesses (SMBs), distributed enterprises, and managed security service providers (MSSPs) the ability to detect advanced threats on endpoints, correlate this with data collected from the network and empower them to centrally respond. Now available with WatchGuard Total Security Suite (TSS), TDR is the only security service on the market that pairs detection and response capabilities on the endpoint with a comprehensive set of industry-leading Unified Threat Management (UTM) network security services.

“As cyber criminals continue to leverage increasingly varied and sophisticated threat vectors, many companies’ endpoints represent under-secured, unnecessary risks for customers, partners, and internal users.” said Andrew Young, SVP of product management at WatchGuard. “By correlating our enterprise-grade network security services with data collected from each individual device, WatchGuard can now provide actionable intelligence that enables comprehensive security from the network to the endpoint.”

TDR Features and Benefits

TDR further allows organizations to protect themselves from cyber threats by correlating events from their UTM appliances and their endpoints. This pinpoints malicious behaviors by using heuristics and threat intelligence, and scores them by risk and severity.

The new service includes the following features and benefits:

·       ThreatSync – provides real-time threat detection and policy-based automated response through cloud-based correlation and scoring. It consumes event data from Firebox appliances, Host Sensors on endpoints, and cloud threat intelligence feeds, correlates the data to generate comprehensive threat scores, and initiates automatic malware response tactics. This intelligent prioritization of each individual threat based on its overall level of risk ultimately allows organizations to decrease time to detection and remediation.

·       Lightweight Host Sensors – extend organizations’ visibility and management to the endpoint by continuously scanning and monitoring security events on devices and sending them back to ThreatSync for analysis, scoring and remediation. Previously a frustrating security blind spot for most organizations, this constant flow of data from devices beyond the traditional network perimeter allows users to visualize and address endpoint threats.

·       UTM Network Security Services – add yet another layer of intelligence into the correlation and scoring process. WatchGuard Firebox M Series, T Series and XTMv appliances, as well as existing TSS services like APT Blocker, WebBlocker, Reputation Enabled Defense and Gateway AntiVirus, also pass threat data through ThreatSync.

·       Host Ransomware Prevention (HRP) module – enables industry-leading prevention against ransomware attacks. Host Ransomware Prevention, along with the advanced malware protection provided through APT Blocker, blocks the execution of ransomware before file encryption takes place on the endpoint, mitigating the ransomware attack before any damage is done.

·       Additional Security Layer to Existing Antivirus (AV) – means that users or MSSPs don’t need to replace existing AV solutions already deployed. TDR works in tandem with existing AV, bringing an additional, powerful layer of threat detection and event correlation to catch anything that AV might miss or be unable to remediate.

 

“As a longtime WatchGuard customer, we are excited about how Threat Detection and Response has tightly and easily integrated with our network defense to add powerful correlation capabilities,” said Andre Bromes, SVP and CIO/CISO of Goodwill New York / New Jersey (goodwillnynj.org), an organization whose mission is to empower individuals with disabilities, and other barriers to employment, to gain independence through the power of work. “The correlated detection and automated response features adds a missing layer to our security stack and have enabled us to immediately detect infections, and prevent them from spreading within our network. This streamlined approach has increased our ability to identify and deal with suspicious activity on our network, and is also saving us valuable resources like time and additional manpower." 

TDR for MSSPs and VARs

TDR enables MSSPs and Value-added Resellers (VARs) to increase the value of their product and service offerings with the ability to provide detection, correlation and response services from the network to the endpoint, manage countless subscriber accounts with ease, and offer a single, comprehensive security solution with one SKU through Total Security Suite.

AVAILABILITY

Threat Detection and Response Service is now available as part of the WatchGuard Total Security Suite. For more information, visit www.watchguard.com/TDR.

ADDITIONAL RESOURCES

·       TDR Brochure

·       TDR Tech Brief

·       Host Sensor Data Sheet

·       ThreatSync Feature Brief

·       eBook: Achieving Security Bliss through Correlation

About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader in network security, providing best-in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide. The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter, @WatchGuard on Facebook, or on the LinkedIn Company page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.