DATA SECURITY

Stellar Cyber's Open XDR strengthens security operations for Barracuda users

Stellar Cyber | November 10, 2021

Stellar Cyber, the innovators of Open XDR and the leading next-gen security operations platform, announced today that it has integrated its industry-leading security platform with Barracuda CloudGen Firewall, Barracuda Web Application Firewall, and Barracuda Total Email Protection, bringing enhanced visibility, automated incident correlation, threat hunting, and remediation to managed security service provider (MSSP) customers and prospects.

"Our customers know that Barracuda delivers best-of-class email, network, and web application security solutions. When it comes to defending against today's sophisticated cyber threats like ransomware and data breaches, they are looking for full visibility and automation," said Fleming Shi, CTO at Barracuda Networks. "We already offer Barracuda SKOUT Managed XDR optimized for our MSP customers. This new integration with Stellar Cyber gives our enterprise customers a holistic view of their infrastructure and the capabilities to coordinate incident response to attacks in real time."

The Stellar Cyber platform incorporates the XDR Kill Chain and AI-driven correlation of detections and alerts into automatically generated incidents in an easy-to-use dashboard with visibility across the entire attack surface, so analysts know exactly what and how to investigate. In addition, Stellar Cyber's built-in multi-tenant features make it easier than ever for Barracuda's MSSP partners to provide SOC-as-a-service offerings to their end-user clients.

"The Stellar Cyber Open XDR platform brings additional value to existing Barracuda product investments by ingesting their logs, enriching the captured data, analyzing that data for threats, and then automatically remediating attacks through the firewall as well as other systems," said Zeus Kerravala, principal analyst at ZK Research. "It's great to see this level of integration to protect customers."

"By integrating our Open XDR AI-powered cybersecurity platform with Barracuda's popular solutions, we deliver a new level of visibility and SOC capabilities, such as correlated threat analysis, threat hunting, and automated remediation, to Barracuda customers,Our purpose-built platform collects and ingests data from all existing security tools and presents a single dashboard that clearly identifies and prioritizes security threats, all the way from individual alerts to sophisticated incidents or attack stories, in a way that maximizes efficiency in SOC operations."

Paul Jespersen, Senior Vice President of Global Business Development at Stellar Cyber

Using ransomware protection as an example, customer benefits of the integration include:
  • Barracuda Total Email Protection signals and alerts will be available in Stellar Cyber to provide visibility into phishing and brand-hijacking attacks designed to harvest credentials.
  • In an event where a phishing link is clicked, Barracuda CloudGen Firewall stops the traffic to the attacker's site and flags the target for all other attempts.
  • Network and application infrastructure are constantly bombarded with intrusion and access attempts, especially with stolen credentials. Provided with signals from Barracuda CloudGen Firewall and Barracuda Web Application Firewall, these attempts will be immediately flagged and prevented.
  • Barracuda is working on deeper and broader integrations with Open XDR platforms like Stellar Cyber. Barracuda customers will be able to stop ransomware more efficiently and get ahead of attackers using credential theft and account takeover in email security and prevent further penetration.


At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data, and applications with innovative solutions that grow and adapt with our customers' journey. More than 200,000 organizations worldwide trust Barracuda to protect them – in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit barracuda.com. 

Barracuda Networks, Barracuda, and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the US and other countries. SKOUT Cybersecurity and the SKOUT logo are registered trademarks of SKOUT Cybersecurity Holdings, Inc. and its affiliates in the US and other countries.

About Stellar Cyber

Stellar Cyber's Open XDR platform delivers Everything Detection and Response by ingesting data from all tools, automatically correlating alerts into incidents across the entire attack surface, delivering fewer and higher-fidelity incidents, and responding to threats automatically through AI and machine learning. Our XDR Kill Chain™, fully compatible with the MITRE ATT&CK framework, is designed to characterize every aspect of modern attacks while remaining intuitive to understand. This reduces enterprise risk through early and precise identification and remediation of all attack activities while slashing costs, retaining investments in existing tools and accelerating analyst productivity. Typically, our platform delivers an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Spotlight

Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats - and sometimes take their eye off old ones - and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case and technical analysis.

Spotlight

Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats - and sometimes take their eye off old ones - and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case and technical analysis.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Sevco Security Introduces First Cybersecurity Asset Attack Surface Dashboards

Sevco Security | December 14, 2022

Sevco Security, the cloud-native security asset intelligence platform for enterprises that want an accurate IT inventory, today introduced the industry’s first cybersecurity asset attack surface analytics dashboards. The new dashboards extend the Sevco platform to give CISO and IT leaders deep insights into the security coverage and state of their IT assets, enabling security teams to identify and eliminate security gaps in the enterprise cyberattack surface. Enterprise environments increasingly include a wide range of hardware, software, mobile devices, cloud infrastructure, and other IT assets as the fundamental backbone for operating the business and engaging with customers. However, with management of assets often spread across departments and geographies, it has become increasingly difficult for executive leadership to understand the security state of all their assets and to maintain accuracy in a dynamic environment. Equally challenging is the inability to gain insights into abandoned or stale IT assets to effectively mitigate the security risks that they introduce. Complex enterprise environments are increasingly experiencing incomplete security coverage with upwards of 19% of assets that have missing or stale security controls like endpoint protection and patch management. The new Sevco Security dashboards fill a critical gap in cybersecurity attack surface management by providing context-based analysis of enterprise-wide assets that surfaces risks associated with IT hygiene, compliance, and policy enforcement. “As organizations innovate and expand their asset footprint, they must have seamless visibility into the security state of their assets because they cannot manage what they cannot measure. “Sevco Security delivers the critical data for CISOs to thoroughly understand their cybersecurity asset attack surface and confidently report their defensive security posture to the board.” J.J. Guy, co-founder and CEO of Sevco Security With the new expansion to its platform, Sevco Security provides customers with data rich and customizable dashboard reports, including: Security coverage: Provides critical insights on asset security controls, allowing customers to identify gaps in coverage and proactively protect the previously unknown attack surface. This also empowers companies to manage internal governance and regulatory compliance requirements to monitor and validate that their security investments are fully deployed. Asset snapshots: Captures the detailed attributes of the assets across the infrastructure, such as IP address, user, and operating system so customers can quickly see the state of any device at any point of time. With asset snapshots, incident response and IT team members can quickly identify when an asset change occurred and manage decisions on restoring an asset to a previous state. Timeline trending: Enterprise assets are tracked on a daily trendline empowering IT and security leaders to gain context of what’s typical for their environment and to readily view spikes and outlier activity. Out-of-the-box trending data is automatically captured for total devices, new devices, inactive devices in the last 15 days, total users, and new users. Custom, interactive dashboards: In addition to the pre-built dashboards, users can create and save unlimited queries on their asset telemetry to produce customized insights dashboards. This puts asset data analysis at users’ fingertips, providing an easy way to obtain tailored insights in a top-level dashboard. All dashboards are interactive, allowing users to ‘click’ and drill deeper into the data for pinpoint clarity on a particular area of interest. Complex asset environments are a normal operating fabric for businesses. Sevco Security is dedicated to helping organizations capture a comprehensive view of their asset ecosystem and readily identify and address any security risks they pose. The new cybersecurity asset attack surface dashboards are now available to customers. About Sevco Sevco Security is the cloud-native security asset management platform for enterprises that require an accurate IT inventory. Its patented telemetry technology creates a unified inventory that is updated continuously to deliver real-time asset intelligence and help security and IT teams identify and close their previously unknown security gaps. Founded in 2020 and based in Austin, Texas, Sevco is backed by SYN Ventures, .406 Ventures, Accomplice and Bill Wood Ventures.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Datadog Announces Integration with Amazon Security Lake

Datadog | November 30, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced a new integration with Amazon Security Lake. The integration, announced during AWS re:Invent, makes it easy for Amazon Security Lake users to send cloud security logs to Datadog in a standard format. Building data pipelines in order to aggregate and route security logs to various security analytics solutions can be a cumbersome and time-consuming process. For Amazon Security Lake customers, Datadog's integration provides an easy way to send security logs to Datadog with minimal configuration required. Once security logs are ingested into Datadog, customers can analyze and identify threats through out-of-the-box detection rules or by writing custom security rules. They can also do deeper investigations using Datadog's log management tools. "Amazon Security Lake makes it easier for teams to manage their cloud security data and analyze it with partner solutions of their choice," said Rod Wallace, General Manager for Amazon Security Lake. "Datadog's integration with Amazon Security Lake will allow customers to collect their security logs to improve their cybersecurity posture and send them to Datadog for analysis leveraging an open source schema." "Security threat detection and investigation is dependent on an effective logging strategy that ensures critical logs are being properly analyzed. However, managing dozens of log integrations from cloud-hosted accounts and entities can be cumbersome and lead to gaps in visibility. "Amazon Security Lake and Datadog are working together to provide an easy way to set up and manage important log integrations for Datadog Cloud SIEM, giving customers deep visibility into their most critical infrastructure." Pierre Betouin, SVP of Security Products at Datadog About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

LogRhythm Improves Security Analytics with Expanded Security Operations Capabilities

LogRhythm | January 06, 2023

On January 05, 2023, LogRhythm, the company that empowers security teams to tackle an ever-changing threat landscape with confidence, introduced a variety of expanded capabilities and integrations for its security operations solutions. The enhancements improve LogRhythm's capacity to serve as a much-needed force multiplier for security teams that are required to defend against cyberattacks with confidence, effectiveness, and efficiency. This update follows the release of LogRhythm Axon, an innovative, cloud-native security operations platform launched in October. In addition, the organization is launching new visualizations and advanced analytics that provide seamless visibility into potential security threats. Axon and its latest updates are designed to simplify the experience of security analysts by making it easier for teams to identify, examine, and report on potential threats, easing the burden of managing risks and the operating infrastructure. In addition, these improvements span the entire suite of LogRhythm's offerings to collectively facilitate threat detection and resolution by SOC teams, improving analyst productivity and effectiveness. The key features of the updates include the following: LogRhythm Axon: New out-of-the-box and custom analytics rules that have rules for MITRE ATT&CK detections. Using the Observation Workflow, customers can quickly investigate log observations raised by analytics. Reduce time spent searching for data through new markdown and histogram widgets. LogRhythm UEBA: New detection models allow for the detection of elusive threats for Windows systems. LogRhythm NDR: Integration with Microsoft EDR improves blind spot detection and endpoint visibility. Enhanced analyst experience through expanded UI improvements. The new configuration page enables to import of data from VirusTotal smoothly. LogRhythm SIEM: The improved collection administrative workflow reduces the time required to configure, deploy, and manage log sources that involve Open Collector. Expanded and updated LogRhythm's library of supported log sources. Improved audit logging makes it easier to detect suspicious activity and track significant changes made by users. About LogRhythm LogRhythm, Inc. is an American security intelligence firm founded in 2003 that specializes in SIEM, log management, network and endpoint monitoring, forensics, and security analytics. With a comprehensive array of high-performance security, compliance, and operations solutions, LogRhythm is built to address a rapidly evolving world of cybersecurity threats. In addition, LogRhythm combines a versatile and comprehensive security operations platform, advisory services, and technology partnerships to help SOC teams defend sensitive data.

Read More