Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:37 PM
Dark Reading
Dark Reading
Products and Releases

Co3 Systems Delivers Security Incident Response In Major Platform Expansion

Provides automated, single-pane incident management in a secure, isolated environment for general security incidents

CAMBRIDGE, Mass. – February 26, 2013 – Co3 Systems, a pioneer in Incident Response software, today announced a major expansion to its industry-first, SaaS-based incident response platform. Complementing and extending the expertise and proven success of the company's flagship Privacy module, the new Security module is the first solution available from any vendor that provides automated, single-pane incident management in a secure, isolated environment for general security incidents including malware infections,Distributed Denial of Service attacks (DDoS) and Advanced Persistent Threats (APTs). As a result, internal incident response teams and incident response service providers can achieve unprecedented levels of effectiveness, accuracy, consistency and compliance, while substantially reducing expense and risk.

The inevitability of compromise today is impossible to ignore, and by many estimates, irresponsible. The Ponemon Institute estimates that slow response to any security incident can be extremely costly –and is getting more expensive every year as attacks become more aggressive and sophisticated. Over the past two years, Ponemon estimates the average time to resolve a cyberattack has grown to 24 days from 18, with an average cost for participating organizations rising to $591,780 from $415,748 –a 42% increase. This "ticking time bomb" is driving explosive growth in an Enterprise Incident Response market predicted to total $14.79 billion by 2017.

Forrester Analyst Rick Holland, in a January report titled, "Five Steps To Build An Effective Threat Intelligence Capability," stressed the need for a focus on incident response and leveraging technology to accelerate intelligence assimilation and process improvement. Holland said, "In today's threat landscape, mature incident response is critical, yet it is very immature at most companies... Mature incident response (IR) consists of technology but also, most importantly, people, process, and oversight."

Even with the most mature internal response teams or external incident response firms, resource coordination and process management are significantly underdeveloped. Domain expertise resides in the minds of team members, and is neither complemented by nor manifested in technology. Tracking processes are generally manual, cumbersome, highly distributed and insecure, leveraging "traditional IT" such as email and spreadsheets--which in some cases become themselves a vulnerability for firms. Process and organizational improvement are very difficult to accomplish, inconsistent and dependent on individual input.

Co3's Privacy module was the market's first daily use and preparedness tool for privacy incidents and is considered today as the industry standard. It provides an easy, automated way to ensure consistency and accountability--across teams, organizations and external stakeholders-- in managing incidents that concern Personally Identifiable Information (PII). Building on this strong and proven foundation, Co3's Security module extends the capability to security events such as malware infections, phishing-related compromise, Distributed Denial of Service (DDoS) attacks, device or Intellectual Property theft and system intrusions.

Co3 Security Incident Management encompasses all phases of incident response, from planning and "fire drill" testing, through codifying best practices into a repeatable response system and subsequent analysis and reporting tools. Benefits of the module include:

· Organizational Readiness--allows organizations to account for and enroll all response team stakeholders, validate and encode response policies and procedures and categorize and profile critical networks and systems

· Event Identification and Assessment--enables immediate alerting of/engagement with all team members, evaluation of incident precursors and indicators, automatic prioritization and assignment of activities, tracking of events/ maintaining logbooks, logging of evidence and generation of assessment summaries

· Incident Containment, Eradication and Recovery-- provides real-time IR plan generation, complete team response coordination, containment strategy selection, cause isolation and evidence gathering and handling instruction

· Post-Incident Capture--establishes a central resource for incident results documentation, lessons learned assessment, policy/procedure updates, reporting to authorities, evidentiary retention and historical performance tracking

"The common refrain in the security industry is that there are two kinds of customers, those who have been hacked and those who don't yet know they have been," said John Bruce, CEO at Co3 Systems. "The reality is that every organization at some level is living in a state of compromise, or at least significant exposure. It's well accepted that the question is no longer when companies will suffer an incident, but rather what are they going to do on the day they discover it. While preventative and detective technologies are absolutely critical in reducing exposure, what Co3 has done with our Privacy and Security modules is give companies the ability to not only recover faster, but also develop the organizational competency to attend to them better over time."

Pricing and Availability

The Co3 Security module is available immediately and licensed annually by the number of seats.

Follow Co3 Systems:

Co3 Systems Blog: https://www.co3sys.com/blog

Videos: https://www.co3sys.com/product-videos

Events & Webinar Series: https://www.co3sys.com/news/events

Twitter: @co3sys

About Co3 Systems

Headquartered in Cambridge, MA, Co3 Systems is an innovator in Incident Response Management solutions. The company's SaaS-based offering enables organizations of all sizes to efficiently prepare for and rapidly manage the Response Process for Security Incidents and Privacy breach events. Companies using Co3 demonstrably minimize the costs resulting from incidents. With funding from Fairhaven Capital, the company's executive team and advisors comprise experts from world-leading security, privacy, software and service organizations. On the web at www.co3sys.com


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.