• About
  • Subscribe
  • Contact
Tuesday, May 20, 2025
  • Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Cloud-driven breach detection device to arm cyber defenders

FutureCIO Editors by FutureCIO Editors
July 18, 2022
Image source: https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/

Image source: https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/

Push button function acts as first response alert for any security breach 

ExtraHop, a cloud-native network intelligence company recently announced its integration with CrowdStrike, to deliver better cyber protection of computing devices, cloud workloads, identity and data.

Its ‘push button’ feature helps security analysts progress from detection to threat containment to investigation with just a single click. Once activated, it will isolate and quarantine individual assets from a detection directly within and then pivot seamlessly into an investigation workflow.

The intelligent feature gives cyber defenders the necessary tools they need to dramatically accelerate containment while minimising disruption to the organisation. 

Unlike automated response offerings, push-button response gives security analysts the ability to control how and when assets are quarantined based on high-fidelity detections. It is enriched with intelligence that extends from the network to the endpoint, or any computing device such as a laptop, desktop or smart phones.

“In the past five years, the detect-and-respond model that assumes the best perimeter defence will eventually be breached.

Jesse Rothstein, co-founder and CTO, ExtraHop. 

Many organisations remain reluctant to invest more in this approach due to the complexity of playbook-driven response. The new push-button arms cyber defenders with the ability to rapidly and precisely quarantine compromised devices without causing massive disruption to the organisation.”  

The new feature effectively detects network and endpoint attack behaviours. With threat intelligence, it can automatically quarantine impacted devices to stop breaches faster. Every second matters during a security breach, users armed with this capability can act with speed and precision, accelerating the response times while minimising the impact to the business.

New capabilities built on existing platforms for highly-targeted attacks  

Security operations centre (SOC) analysts play a central role in modern security teams, because they are on the front line of cyber defence, detecting and responding to cyber attacks as they happen.

“This new capability enables faster remediation and faster time to respond, letting teams focus on critical assets and resources,” said Chris Kissel, research director, security and trust, IDC. “The focus on streamlining the work of the overburdened SOC analyst adds real value for defenders.”

Integration across multiple security platforms

Push-button response to integrate throughout various security operations platforms, worldwide:

  • Unified threat intelligence: It details behavioural insights to deliver complete coverage, by analysing correlated data that is contextualised through a console.
  • Real-time detection: security teams can rapidly detect threats, such as anomalies in network access privileges and suspicious remote access connections. It detects any irregular data exfiltration, ie.,​​ theft or unauthorised removal of any data from a network or device. They also can thwart attack techniques occurring on the endpoint, including ransomware, local file enumeration, process spawning, and code execution. This provides complete coverage across the entire attack surface.
  • Instant response: instantly quarantines a device with a single click within the platform. This approach cuts off attacker access to network resources and endpoints, stopping an attack in progress without disrupting business or slowing the investigation workflow.  
  • Continuous endpoint visibility: continuously updates and maintains a list of devices impacted by threats. This alerts customers to newly connected and potentially compromised devices that need instrumentation for device-level visibility. It also extends edge visibility to include IoT devices that may not be compatible with some agents. 

“With new advanced and evolving threats challenging organisations daily, security teams must act with impeccable speed and accuracy to safeguard the business from a breach.”

Geoff Swaine, vice president of global programs, store, and alliances at CrowdStrike.
Related:  Failure to prioritize cybersecurity hinders digital transformation journey of most Singapore firms
Tags: cloud securitycyber threatscybersecuritydata protectionidentity and access managementransomwareSaaS
FutureCIO Editors

FutureCIO Editors

No Result
View All Result

Recent Posts

  • Equinix signs first renewable energy PPA in Japan
  • Vertiv launches new cooling system for AI applications
  • Informatica launches new AI-powered cloud integration and master data management capabilities
  • SG businesses are investing in emerging technology, but ICT suppliers must adapt strategies, study finds
  • ASEAN application development landscape: Navigating challenges and embracing opportunities

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
  • Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe