Attack Detection & Analytics Platform

Answers, not clues...

 

2.0 MILLION

PROTECTED ENTERPRISE USERS

4.0 BILLION

COMMUNICATIONS ANALYZED DAILY

200 TERABYTES

OF LOGS ANALYZED WEEKLY

 

Unsplashed background img 1

Seculert Key Benefits & Features

 

Security Analyst Resource Gap

There are approximately 80,000 cyber security analysts employed in the U.S. today. At the same time it is estimated that there are 300,000 unfilled vacancies for the same role a gap that is expected to grow to over 1.5 million globally by 2020…

It’s little wonder that many CISOs identify “human resources” as their biggest concern today. The reason for this extreme gap between the supply of qualified security analysts and the demand for them is that the conventional method of identifying and remediating cyber-attacks is extremely labor intensive.

Security industry research indicates that the average SIEM generates approximately 17,000 alerts per week of which less than 20% are considered reliable. At the same time, most SOC operations are so understaffed that they can only investigate fewer than 5% of these events. The net result is that the average amount of time it takes to find and remediate a new infection now stands at 22 days.

Metaphorically, cyber-security today is exactly where the textile industry was in the mid-1700s. At the time manufacturing cloth was also profoundly labor intensive. There was said to be as many as a quarter million hand looms in operation in the UK alone. It wasn’t until Edmund Cartwright built the first power loom in 1785, however, that the textile industry took off. By automating a key manufacturing process Cartwright revolutionized the textile industry. As the numbers above indicate, cyber-security is ripe for a similar revolution.

Seculert was founded on the idea that certain aspects of attack identification must be automated to reclaim the initiative from the adversary. Using a combination of security analytics, proprietary attack profiles, and supervised machine learning, Seculert has automated the process of finding attacks that have circumvented legacy prevention systems.

By only delivering “True Positive” infection reports to security teams, Seculert greatly reduces the time required to find and remediate new attacks. Seculert customers report that deploying our Automated Attack Detection Platform is equivalent to finding (and training) 5-10 new security analysts. Automation of the attack identification process will drive the next revolution in cyber-security and Seculert is leading that revolution.

find out more
 

You Can't Kill What You Can't See

As recent breach disclosures have revealed, it’s entirely common for an enterprise network to be breached weeks or months before any evidence emerges that it has been compromised…

At Seculert, we are committed to providing three different types of visibility to our customers:

  1. Visibility on currently active attacks on our customer’s networks with extremely high fidelity and precision. We call this “True Positive” infection reports. If we report that a specific device is infected…it IS. There’s no further investigation or analysis required. Many Seculert customers just feed these reports directly into their trouble ticket system for rapid remediation
  2. Visibility on overall security system performance…what’s working, what’s not, and why.
  3. Comparative visibility on how our customer’s security systems are performing relative to similar enterprises with comparable security postures.

AND we provide this visibility regardless of whether you’re running a world class Security Operations Center or you’ve outsourced this function to one of the leading MSSPs. Regardless of how you run IT security operations, you’re entitled to see what’s attacking you.

find out more
 

Real World Threats, Exposed in 2 Minutes

Seculert Javelin is the first network attack simulation and remediation service that allows you to determine how well your secure web gateways (SWG), next-generation firewalls (NGFW), or proxy would do at preventing the latest, real world, malicious malware attacks from succeeding in communicating with their perpetrator’s command and control servers.

Javelin has been created to replicate the latest behavioral communication that attackers use to successfully exfiltrate data. The test takes less than 2 minutes to complete and uses no actual malware. Javelin also allows enterprises to observe how well their business partners are doing at responding to current attacks and protecting any of your intellectual property to which they may have access.

Seculert offers an update package service to fill the gaps that Javelin identifies.  The update package contains details about the simulated attacks, a license to run unlimited attack simulations as well as fixes to update an enterprise’s SWG to contain the attacks should live attacks present themselves.

To learn more and test Javelin on your own network, click here.

find out more

Latest From The Blog

Mar 18, 2016 10:52:40 AM

There's a hole in my bucket, dear Liza

Say you’ve got a bucket with some holes in it. Much like Henry in the famous song, you would really like to mend them. But,...

visit the blog

Say you’ve got a bucket with some holes in it. Much like Henry in the famous song, you would really like to mend them. But, before you actually mend the holes you would need to discover whether you do have open holes, or maybe all of them are already mended.

Similarly, as the person in charge for the security of your enterprise network, you would most likely want to know if your web gateway (whether it’s a proxy, a secure web gateway, or next gen firewall) will be able to block the attackers’ tools from communicating back to the attackers. Because, we all know by now that eventually an attacker will be able to get inside your network and compromise at-least one of the devices. In fact, in our recent research we discovered that an average of 2% of the devices in a typical enterprise environment are already compromised.

This is exactly why Seculert created Javelin. Javelin is an attack simulator, which will “pour water” across your network environment and will try to reach out to places which your web gateway should have already blocked.
In order to do that, we have picked the top and latest bad actors that we could find by analyzing the traffic logs of our 2 million enterprise users. We then safely simulate the outbound communication behavior of each of the tools those bad actors are using in their attacks. You then have instant visibility on whether your web gateway was able to block those potential attacks or not. This is all done without the need to install any software or hardware.

If your web gateway is configured properly, and it is really is able to protect you against the latest attacks, you should see a result similar to this:

Javelin-2-10.png

 

The benefit of running Javelin is obvious - in a matter of 2 minutes, you will know if your web gateway vendor is providing you with the protection they have already promised to provide. Unfortunately, according to our latest research, over 40% of of outbound communications are not blocked by enterprises which are using the leading web gateway vendors. Therefore, we are also offering a way to “fix” this gap by providing a continuous update to your web gateway that will proactively contain any potential compromise.
Furthermore, if you don’t want to be the “next Target”, and would like to have a visibility into how the security posture of your third party suppliers is up-to-date, Javelin can provide you with that instant visibility.

So, if you would like to instantly know how your own web gateways perform, I encourage you to run the free Javelin Attack Simulator test now!

Unsplashed background img 2

news alert

What's New at Seculert

 

latest press

Apr 27, 2016 5:00:00 AM

Seculert’s Javelin Attack Simulator Reveals Serious Gaps in Organizations’ Perimeter Defenses

Santa Clara, Calif. – April 27, 2016 Seculert, the leader in attack detection and analytics, today announced new findings that 80 percent of secure web gateways installed by Fortune 1000 companies miss 80 percent of malicious outbound..

view more

in the news

eWeek - March 17, 2016

Seculert Javelin Finds Holes in Security Gateways

A best practice for IT security has long been to deploy some form of gateway security, be it a firewall or an intrusion prevention system that is able to block potentially malicious traffic coming into or coming out of a network. But how does an organization know for sure if its security gateway is, in fact, stopping all the bad traffic?

view more
 

“Deploying Seculert was like hiring three extra security analysts for a fraction of the cost, and these three never sleep!”

Richard Rushing, CISO, Motorola Mobility

Unsplashed background img 3

Contact Us

Unsplashed background img 2