Story image

Carbon Black integrates with Chronicle security analytics platform

12 Mar 2019

Endpoint security company Carbon Black has announced a collaboration with Chronicle as part of an industry effort to improve visibility of, and response to, cyber threats.

Chronicle’s recently announced security analytics product, Backstory, is a global platform designed to help enterprise customers analyse the security telemetry they generate every year.

By collaborating with Chronicle, Carbon Black is committed to integrating with Backstory.

The goal is to empower joint customers to be better able to investigate incidents, hunt for threats and respond to attacks within their networks.

As cyber attacks are detected by Carbon Black’s endpoint security solutions and predictive data modelling, Chronicle uses the data to analyse months to years of attack information, as well as determine patterns across time.

The desired result is simpler, faster and more cost-effective security analytics.

Carbon Black co-founder and chief strategy officer Michael Viscuso says, “Organisations generally lack the visibility, scale and speed required to analyse massive amounts of security data quickly and effectively.”

“With Backstory, we believe Chronicle is raising the industry bar for security analytics when it comes to speed and scale.”

Stronger cybersecurity through big data and analytics

The integration combines Carbon Black’s comprehensive endpoint detection and response (EDR) data with Backstory, offering security teams a way to more quickly and effectively investigate security alerts and take immediate action.

As an endpoint security service with more than 15 million global endpoints under management and more than 5,000 global customers, Carbon Black’s endpoint security platform sees and processes billions of endpoint security events per day.

Within Carbon Black’s technology, endpoint activity is continuously recorded, hampering an attacker’s ability to remain undetected.

With this data, Carbon Black hopes its customers and partners will be able to stop more attacks, earn actionable visibility across the enterprise and simplify their security and IT operations.

“As a global platform designed to analyse enterprise security telemetry, Backstory provides more value to customers when it’s integrated with other key technologies within the customers’ networks,” says Chronicle chief product officer Ansh Patnaik.  

“We believe our integration with Carbon Black gives customers a broader, more accurate view of threats within their networks."

Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.