Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

9/18/2017
02:47 PM
Simon Marshall
Simon Marshall
Simon Marshall
50%
50%

Vigilance Brings Machines & Humans Together to Defeat Threats

Vigilance, from SentinelOne, ties the strengths of humans and machines together in a threat-resolution system.

People and machines together can be greater than the sum of their parts, and this is exemplified by SentinelOne, a Silicon Valley-based firm that secures endpoints, datacenters and the cloud.

Vigilance is the name of the game, and also happens to be the name of SentinelOne's new service, based on its existing endpoint security platform, which augments the power of computer threat detection with a team of human analysts and researchers based in Mountain View and Tel Aviv.

The platform detects the threats. The humans examine, discuss and then respond to them. Simple.

According to SentinelOne this is an optimal arrangement where detection, prioritization and responses are accelerated because there are more bodies and know-how on the job, apparently thereby reducing corporate risk. The Vigilance service provides the elasticity to call on additional eyeballs during a high threat period, or to provide more expertise in security analysis and research than might be found in a single enterprise team instance.

There's a strong reliance from the Vigilance team on the platform to provide primary threat information -- to be the eyes and ears -- and for the analysts and researchers to be the brains. "The service ingests threat information from the agent detection, and 80% to 90% of the analysts' tasks are based on that information," said Eran Ashkenazi, VP of services and field operations for SentinelOne.

Oddly enough, the more problems the SentinelOne platform needs to handle, the better. It learns how to handle unique incidents and then that knowledge is propagated to SentinelOne's entire customer base, theoretically lessening the impact a new threat can have and spreading the benefits. At the 50,000ft level, the platform's main role is to differentiate between false and true positives, and then hand off that information to the human team. But what happens if the humans then make mistakes?

"There are several safeguards, but in short if there is a doubt, issues will be escalated to a second tier of malware researchers or reverses, or we'll interact with the customer to learn more or get the actual file or payload," Ashkenazi told SecurityNow.


Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo featuring speakers from Comcast and Charter.

An interesting aspect of the service is the ability for enterprise security teams to bring online extra personnel when they're needed. In some cases, those companies may simply have underestimated how many members of a team are needed to handle threats. But also, the sheer number of tools out there can cause headaches too.

"There are simply too many solutions to manage, and an average security team needs to probably deal with dozens of different platforms and dashboards," said Ashkenazi. "[Plus] the endpoint was for many years considered to be something that just works, which we [now] know is not the case."

In the last five years, endpoint protection, and endpoint detection and response, platforms have become more resource-intensive as the range and number of attack vectors increases. Like bacteria on a petri dish, the threats multiply in number and diversity until the whole lab is crawling with infectious organisms. Yet the number of scientists and technicians remains the same.

In SentinelOne's lab, they're looking next to incorporate AI into the platform, once deep visibility capabilities have nee incorporated, proving more data into the Vigilance service, enabling proactive hunting capabilities, and making the security stance of the platform more proactive.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.