News, news analysis, and commentary on the latest trends in cybersecurity technology.
Mandiant Tackles Ransomware and Breaches With New Tools
Mandiant's new software-as-a-service offerings tap into the company's extensive threat intelligence capabilities to help cybersecurity teams detect and respond to ransomware attacks and data breaches.
Mandiant announced two new Mandiant Advantage services to fight ransomware and data breaches during the annual Cyber Defense Summit. The new software-as-a-service offerings — Active Breach & Intel Monitoring and Ransomware Defense Validation — allow enterprise security teams to detect the presence of active Indicators of Compromise in their environments and test their defenses against ransomware attacks.
Active Breach & Intel Monitoring proactively monitors customer networks to identify the presence of IOCs based on insights drawn from Mandiant’s global incident response engagements and threat intelligence research. The service searches for IOCs to uncover active breaches as well as historical incidents. Mandiant evaluates the IOCs and prioritizes the alerts so that security teams can rapidly identify potential attacks and reduce the amount of time a threat actor has to cause damage.
Ransomware Defense Validation lets security teams test their critical security controls against prevalent ransomware and identify gaps that require immediate attention. Organizations can test their anti-ransomware defenses by tapping into the latest threat intelligence Mandiant has on active ransomware attackers and their tactics, techniques, and procedures. Security teams can find out what changes need to be made to their defenses to block or contain ransomware attacks.
Mandiant Advantage, unveiled last year, currently has four modules delivering automated defense, threat intelligence, security validation, and attack surface management. The modules for Active Breach & Intel Monitoring and Ransomware Defense Validation are expected to be generally available in January 2022.
Read more about Active Breach & Intel Monitoring and Ransomware Defense Validation here.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024