Vectra AI নতুন New frontier of security according to PACA’s economic and political newsletter

In the age of digital transformation, automated services have secured a high place in the agenda of most companies.

Until recently, however, IT security lagged behind. IT professionals, on the other hand, are overworked and under-staffed. The problems start in the Security Operations Center (SOC) which in many cases is managed according to an old dynamic. The complexity of modern devices, remote staffing and the multi-cloud environment have pushed the activities of these centers to unprecedented levels of unpredictability. These adaptations, combined with the advanced methods used in ransomware and supply chain attacks, are likely to spell disaster for any organization that does not take the initiative to modernize its security infrastructure.

Traditional methods pave the way for new attacks

We can call it SOC 1.0. Traditionally, legacy-centric security centers (SIEM and IDS) have become obsolete in response to modern cyber threats. The tools it typically uses are very expensive, but give limited results, fail to detect attacks in progress, and focus more on threat prevention than building resilient defenses against them. In addition, the technologies currently used have moved away from traditional SOC thinking, allowing analysts to manually manage them from limited data sources, allowing only partial conclusions to be drawn. Ultimately, the business ends up with a safety team that operates in an inefficient workflow at a high cost and lack of visibility.

So the time for change has come. We’ve often seen prevention strategies fail to detect ransomware: these are man-made attacks – the malware is only revealed at the last point – which means the only way to stop them is to detect and block the movement of attackers in the organization’s own environment. .

Develop a modern SOC

Let’s first think about security professionals. Although before the epidemic, customer experience was all the rage, today companies are putting employee experience at the top of the priority list. Proven functionality of remote work allows cyber-talents to work wherever they please: When designing a new SOC, the company is asked to visualize an ecosystem that eases the workload of the technical profile. Otherwise, it runs the risk of losing the most qualified candidates to other organizations.

The need to retain top talent is an additional reason for modernizing SOCs and adopting a visionary approach that prioritizes visibility and workflow. Modern security centers continue to use SIEM logs and analytics, but enhance them with endpoint and network data. This is Endpoint Detection and Response (EDR), Network threat detection and response (NDR) Artificial intelligence, and developed by User and Entity Behavior Analysis (UEBA). New SOC 2.0 On-premises builds a network between cloud and cloud-native applications, enabling suspicious activity and detection of previously unknown attackers’ movements.

Where to start construction of new SOC? Artificial Intelligence (AI) can be a valuable contributor. With the right AI platform, it is possible to improve the accuracy of alerts, optimize investigations, identify new threats, and prioritize responses. Artificial intelligence is incredibly good at processing large data sets quickly and efficiently, while people are exceptional in terms of relevant information.

Help from AI and machine learning

Analysts should therefore be equipped with AI and machine learning capabilities that detect risk-related behaviors, while other AI systems automate many functions of traditional security centers. Thus, false positives are significantly reduced, eliminating the pressure of constant alertness. SOC modernization is the future for any organization that wants to develop an efficient and sustainable security operations center. Cyber-threat investigations are much more successful if they are managed by an intelligent system and are supported by trained professionals who analyze a list of suspicious behaviors and are supported by accurate analysis. Such SOCs can improve governance and build trust among regulators, investors and customers. The ability to identify, evaluate and prioritize threats in real time ensures quick and efficient problem solving and avoids costly and embarrassing violations.

Vectra is a pioneer in SOC conversion

Vectra AI is a major EDR partner in the market and is significantly part of the CrowdXDR Alliance, which demonstrates its leading position. The CrowdXDR Alliance is a circle of cybersecurity innovators focused on the future, not the past of SIEM. Vectra AI is part of this game-changing XDR ecosystem that combines powerful sources of endpoint telemetry to improve security. Partnerships that contribute to more efficient and efficient integration are key to realizing Vectra AI’s vision of a secure and fair world.

Outcomes of SOC conversion: resilience, efficiency and reliability

– The Tolerance Because the organization is able to resist and resist sophisticated modern attacks.

Skills : Security managers are freed from inherited tools and technologies that do not work together or are not suitable for today’s environment, and it is easy to overcome all kinds of compliance challenges.

– L.‘Insurance Attackers who have no place to hide, critical threats brought to the fore by context, and machine learning help SOCs to stay at the top of the growing threat landscape.

SOC Conversion is critical to current and future cybersecurity, and Vectra AI offers the best-in-class analytics specifically designed to support conversions, detecting adversaries on the surface of any attack and neutralizing their attacks.

About Vectra AI

Vectra® is a leader in threat identification and response for hybrid and multi-cloud enterprises. The Vectra platform uses AI to quickly identify threats across the public cloud, identity, SaaS applications and data centers. Only Vectra optimizes AI to detect attackers’ methods – TTP at the center of all attacks – instead of simply warning the ‘different’ ones. The resulting high-fidelity threat signal and clear context enable security teams to respond quickly to threats and quickly stop attacks in progress. Companies around the world trust Vectra to ensure their cyber security resilience against dangerous cyber threats and to prevent ransomware, supply chain compromises, camouflage and other cyber attacks from affecting their activities. For more information, visit vectra.ai.

Leave a Comment