Story image

Secureworks opens up proprietary UEBA through partner programme

05 Sep 2018

Cybersecurity company Secureworks announced that it will partner with other security solution providers to apply its Red Cloak behavioural analytics in their customers’ environments.

Secureworks’ decision to decouple its proprietary analytics offering from its endpoint agent will make the company’s high-fidelity detection and threat hunting capabilities available more broadly in the marketplace, while also giving clients the freedom to choose endpoint security products that best meet their needs.

Secureworks threat hunters and incident responders developed Red Cloak in 2010 when they were unable to find adequate tradecraft for analysing threat actor behaviour and intent.

The company has since deployed Red Cloak in response and hunting engagements around the globe and also applies the analytics as part of the company’s managed detection and response offerings.

With the launch of its Red Cloak Partner Program, Secureworks will engage in a more transparent exchange of raw data with participating vendors.

This collaboration will generate the necessary level of telemetry that Secureworks analysts require to apply Red Cloak behavioural analytics effectively and generate positive outcomes for the client.

When a partner’s solution is coupled with Secureworks telemetry and intelligence, clients can expect:

  • a comprehensive view of threat actor activity in their environment,
  • better context for validating and remediating threats,
  • new countermeasures as vendors share a broader range of threat detection and response data and
  • the option to conduct threat hunting searches

 “We are launching this program to foster more cooperation and transparency in the security market and help clients detect advanced threats,” says Secureworks president and CEO Michael Cote.

“The Red Cloak Partner programme enables Secureworks to apply its intelligence and threat hunting capabilities to the client’s choice of security tools.”

 “In the majority of incident response engagements, we discover that the organisation lacks enough visibility to accurately identify malicious activity,” says Secureworks chief threat intelligence officer Barry Hensley.

“Secureworks’ analytics engine leverages our understanding of threat behaviour to detect adversaries who are using complex techniques to elude an organisation’s security controls.

“When Red Cloak is deployed, clients can rapidly focus resources on the right priorities versus getting lost in a maze of forensics activity.”

Secureworks invests heavily in developing counter threat intelligence and platforms that provide earlier warning of hidden intruders.

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.