Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/12/2021
03:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Launches XDR Solution that Synchronizes Native Endpoint, Server, Firewall, and Email Security

Sophos XDR extends new EDR capabilities across next-generation cybersecurity solutions, creating the most comprehensive and integrated threat detection and response system.

OXFORD, U.K., May 05, 2021 (GLOBE NEWSWIRE) -- Sophos, a global leader in next-generation cybersecurity, today announced Sophos XDR, the industry’s only extended detection and response (XDR) solution that synchronizes native endpoint, server, firewall, and email security. With this comprehensive and integrated approach, Sophos XDR provides a holistic view of an organization’s environment with the richest data set and deep analysis for threat detection, investigation and response.

“We’re seeing an extraordinarily high level of complex ransomware and other cybercrime, and the need for effective, comprehensive cybersecurity has never been more critical or urgent,” said Dan Schiappa, chief product officer at Sophos. “Sophos XDR is a game-changing new solution for proactively defending against the most sophisticated and evasive attacks, especially those that leverage multiple access points to gain entry, move laterally to evade detection, and do as much damage as possible as fast as possible.”  

Attacks on Steroids
Sophos today also published new research, “Intervention halts a ProxyLogon-enabled attack,” detailing an attack against a large organization that began when the adversaries compromised an Exchange server using the recent ProxyLogon exploit. The research shows how the attackers moved laterally through the network and, over a two-week period, stole account credentials; compromised domain controllers; secured a foothold on multiple machines; deployed a commercial remote access tool to retain access to hacked machines; and delivered a number of malicious programs.

“As explained in the research report, the attackers returned repeatedly, sometimes with different tools and other times to deploy the same tool, such as Cobalt Strike, on different machines. They used a commercial remote access utility rather than the more standard RDP that threat hunters would more typically look for,” said Schiappa. “This report explains the complex nature of human-operated cyberattacks and how multi-stage, multi-vector incidents are difficult for IT security teams to track and contain. The target simply couldn’t keep up with the attack activity taking place across all parts of the estate. Based on Sophos’ 2021 State of Ransomware report, this issue is more widespread than this one incident. More than 54% of IT managers surveyed said cyberattacks are too advanced for their IT teams to handle on their own. XDR is a critical defense component.”

Deep Threat Analysis with Rich Data Set
Sophos XDR extends visibility across Sophos’ next-generation portfolio of solutions for an in-depth picture of threats. At the heart of Sophos XDR is the industry’s richest data set. Sophos XDR offers two types of data retention, including up to 90 days of on-device data, plus 30 days of cross-product data in the cloud-based data lake. The unique approach of blending on-device and data lake forensics provides the broadest and most in-depth contextualized insights that can be leveraged by security analysts through Sophos Central and via open application programming interfaces (APIs) for ingestion into security information and event management (SIEM); security orchestration, automation and response (SOAR); professional service automation (PSA); and remote monitoring and management (RMM) systems.

The data lake hosts critical information from Intercept XIntercept X for ServerSophos Firewall, and Sophos EmailSophos Cloud Optix and Sophos Mobile will also feed into the data repository later this year. Security and IT teams can easily access this data to run cross-product threat hunts and investigations, and to quickly drill into granular details of past and present attacker activity. The availability of offline access to historical data further protects against lost or impacted devices.

Sophos today additionally released a new version of its industry-best endpoint detection and response – Sophos EDR. New scheduled queries and customizable contextual pivoting capabilities make it faster and easier than ever for security analysts and IT administrators to identify, investigate and respond to security issues with speed and precision. Users further benefit with new pre-configured queries and powerful threat intelligence through integration with SophosLabs Intelix. Sophos EDR customers can access seven days of cloud hosted data (upgradable to 30 days) in the data lake, in addition to 90 days of on-device data.

“As one of the world’s top British fashion retailers with hundreds of stores worldwide, security is a top priority. We’re committed to protecting our loyal customers’ data, and that starts with securing our networks against advanced threats,” said Alistair Knowles, cyber security analyst at Ted Baker. “Sophos XDR provides critical visibility into a goldmine of valuable endpoint data, enabling us to detect and stop threats before they cause any damage. We can easily look for those needle in a haystack kind of incidents and determine their scope with both new and historical data at our fingertips. Integration with solutions like Splunk, for example, take it to the next level with even deeper insights. Once we have the forensics needed to neutralize a threat, Sophos’ Live Response capabilities enable us to remediate issues remotely, which is imperative in today’s remote working environments.”

Cybersecurity Evolved: An Adaptive and Open Cybersecurity Ecosystem
Sophos XDR and EDR are part of the Sophos adaptive cybersecurity ecosystem (ACE), a new open security architecture that optimizes threat prevention, detection and response. Sophos ACE leverages automation and analytics, as well as the collective input of Sophos products, partners, customers, developers, and other security industry vendors to create protection that continuously improves – a virtuous cycle that is constantly learning and advancing.

Sophos ACE is built upon the data lake, correlating actionable insights from Sophos solutions and services as well as threat intelligence from SophosLabsSophos AI and the Sophos Managed Threat Response team. Open APIs enable customers, partners and developers to build tools and solutions that interact with the system and to take advantage of existing integrations. Sophos is leading the industry with this approach and already integrates with many vendors.

“Attackers are getting smarter and better than ever at evading detection. The only way to keep pace is with AI-powered automation to analyze and react faster to behaviors and events, coupled with human analysts to correlate multiple suspicious signals and interpret their true meaning,” said Schiappa. “The Sophos adaptive cybersecurity ecosystem is an evolution of Sophos’ acclaimed synchronized security approach, and a beautifully elegant solution to a complex problem. The smart ecosystem is engineered to protect the interconnectedness of our businesses and online world, and it couldn’t come at a more pivotal time given realities of the past year that forced sudden shifts in remote working and cloud adoption.”

Availability
Sophos XDR, as well as the updated EDR capabilities for Intercept X Advanced with EDR and Intercept X Advanced for Server with EDR are available worldwide on May 19 through Sophos partners. Partners and customers can easily manage all XDR and EDR product solutions on the cloud-based Sophos Central platform via a single user interface.

Additional Resources


About Sophos
As a worldwide leader in next-generation cybersecurity, Sophos protects more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-powered solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cyberattack techniques, including ransomware, malware, exploits, data exfiltration, active-adversary breaches, phishing, and more. Sophos Central, a cloud-native management platform, integrates Sophos’ entire portfolio of next-generation products, including the Intercept X endpoint solution and the XG next-generation firewall, into a single “synchronized security” system accessible through a set of APIs. Sophos has been driving a transition to next-generation cybersecurity, leveraging advanced capabilities in cloud, machine learning, APIs, automation, managed threat response, and more, to deliver enterprise-grade protection to any size organization. Sophos sells its products and services exclusively through a global channel of more than 53,000 partners and managed service providers (MSPs). Sophos also makes its innovative commercial technologies available to consumers via Sophos Home. The company is headquartered in Oxford, U.K. More information is available at www.sophos.com.

Contact information:
Brandon Reid, [email protected]

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.