Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/19/2019
06:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Respond Software Launches First Responder Service to Automate Speed, Accuracy of MDR at Fraction of Cost

New Service Combines Proprietary Detection and Investigation Software with Human First Responders

MOUNTAIN VIEW, Calif. – Nov. 19, 2019 – Respond Software, innovator in Robotic Decision Automation (RDA) for security operations, announced today the launch of its First Responder Service, a Managed Detection and Response (MDR) Service. The service builds on the Respond Analyst™, the company’s decision automation software, for customers who want a “concierge” escalation model. This offering addresses the challenge customers face with Managed Security Service Providers (MSSP) and MDR services that rely heavily on human Security Operations Center analysts to monitor and investigate security incidents resulting in warnings and escalations that include high numbers of false positives, dead ends and unactionable alerts.

Click to Tweet: @RespondSoftware’s First Responder Service Combines Human and Machine Reasoning for Stronger #Cybersecurity: https://tinyurl.com/u386sml #MDR #ManagedDetection

The First Responder Service, in conjunction with a Respond Analyst software subscription, provides improved investigation results at a fraction of what a managed service costs. The Respond Analyst is decision automation software trained as an expert cybersecurity analyst, combining human reasoning and machine power to make complex decisions with 100% consistency. Respond Software’s First Responder team follows up on critical incidents, providing customers with access to Respond’s team of security experts.

The First Responder Service can be used across a customer’s heterogeneous security stack to analyze security events with precision, greatly reducing false positives and overall attack dwell time. The service includes:

  • Automated incident escalation: Within five minutes of incident creation, customers have 24x7x365 access to unrivaled situational awareness and a point of escalation when needed.
  • Live consultation: Expert First Responders are available for customers to engage for incident assistance with intrusion/attack analysis, recommendations for remediation and more.
  • Quarterly briefings: The First Responder Service includes regular updates to help customers understand key metrics and performance indicators specific to their environment and team.
  • Enhanced onboarding: First Responders will interact with the customer’s team for a white-glove onboarding experience during the first 30 days. 

 

Christina Richmond, principal analyst, Enterprise Strategy Group, said: “Recent ESG research informs us that 76% of organizations find threat detection and response more difficult today than it was two years ago because of sophisticated threats, increasing workloads, and a rapidly growing attack surface. It is critical to identify, investigate and escalate the critical security incidents from alerts across your existing security stack and offerings such as the First Responder Service can assist beleaguered security teams to do so. In addition, the First Responder Service provides access to additional human resources such as a team of incident responders to provide more color to the incident and recommendations for remediation. The line between software and service provider is starting to blur, with the customer benefitting through potential lower total cost, fewer incidents, and access to expertise.”

Mike Armistead, CEO and co-founder, Respond Software, said: “MSSPs and MDR providers collect mounds of data, much of which can’t be used because there aren’t enough people to dig through it to find actionable information. These service providers are expensive, often lock customers into their stacks, and don’t perform as expected. By combining the Respond Analyst with trained professionals, we have created a new kind of MDR that solves these issues at a reasonable cost. Customers now have the option for concierge-level cybersecurity assistance that offers the best of human and machine reasoning.”

About Respond Software

Respond Software delivers near-instant return on investment to organizations in their battle against cyber-crime. As a leader in the emerging class of automated software known as Robotic Decision Automation (RDA), Respond Software is working to address the critical shortage of skilled security analysts impacting security teams of all sizes. Its patented intelligent decision engine, PGO®, uniquely combines human expert judgement with the scale and consistency of software to dramatically increase capacity and improve monitoring and triage capabilities at a fraction of the cost of in-house or outsourced personnel. Respond Software was founded in 2016 by security and software industry veterans and services customers across critical infrastructure sectors such as banking, energy, and retail. https://respond-software.com/

 

Related links:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment:   It's a PEN test of our cloud security.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9720
PUBLISHED: 2020-01-24
Tornado before 3.2.2 sends arbitrary responses that contain a fixed CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
CVE-2015-1525
PUBLISHED: 2020-01-24
audio/AudioPolicyManagerBase.cpp in Android before 5.1 allows attackers to cause a denial of service (audio_policy application outage) via a crafted application that provides a NULL device address.
CVE-2015-1530
PUBLISHED: 2020-01-24
media/libmedia/IAudioPolicyService.cpp in Android before 5.1 allows attackers to execute arbitrary code with media_server privileges or cause a denial of service (integer overflow) via a crafted application that provides an invalid array size.
CVE-2015-2688
PUBLISHED: 2020-01-24
buf_pullup in Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
CVE-2015-2689
PUBLISHED: 2020-01-24
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.