Story image

CyberHawk: Your protection against a new generation of hackers

20 Jun 17

Looking for a solution that’s airtight?

The odds that your organisation’s security will be compromised are very high. So why not protect yours with the eyes of a hawk?

Over the past 2 years at least 40% of New Zealand businesses have experienced some form of cyber-attack costing in the hundreds of millions of dollars to rectify.

Loss of reputation, exposed sensitive and critical company data, and business continuity are very real concerns for business owners, directors, and CEOs alike.

The recent WannaCry ransomware attack is a perfect example of how an entire national health service can be hit causing disastrous results, not to mention its malicious spread across 150 countries. 

In much the same way as the “hawk” has razor sharp vision and incredible hunting prowess, so does NSP’s new flagship security as a service product, CyberHawk.

NSP have spent months of in depth research and evaluation selecting “best of breed” technologies to merge into their CyberHawk security as a service offering. The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks.

While this method isn’t ineffective, hackers have become more creative, stealthy, targeted, and extremely persistent. Offenses often go undetected for a long period of time. 

Security teams often lack effective tools, automation, and processes for streamlining threat investigations and incident response. Often a threat won’t be detected for months on end, in some cases years, with the average time to detection being 229 days.  

From the beginning, security has been in the NSP DNA. It was a natural progression and only a matter of time before they created a comprehensive future proofed security offering. As early adopters of various security technologies and the managed service model, the cost effective end-to-end solution is already a hit with customers.

Built from a powerful combination of market-leading security intelligence, advanced security awareness training, and next generation firewall technology, CyberHawk not only removes risks before they can be exploited, it also enables rapid real time response if the unexpected does happen.

The new system has already proved its worth, identifying a threat from a Middle Eastern country trying to exploit a customers’ servers. It was intercepted, stopped in its tracks, and mitigated before it escalated.

“The value of working with an intelligent, real time, dynamic system, is having the ability to rapidly detect, analyse, and correlate threats from multiple independent sources, and neutralise the attacks. Such intelligent forensic detail across an organisation’s entire environment, means we able to act swiftly, always," explains Brent Larsen, NSP managing director.

"Previously one could only imagine the power of a system that identifies unusual traffic behaviour, displays the geo location of the source attack IP and intended host, and then reveals the method of attack upon which to act upon. This is what we are now able to offer,” says Larsen. 

Another benefit are the customised visual dashboards that allow NSP to take a global view exploring the origins, identifying threat trends, with an incredible granular ability to drill down to specifics.

The inbuilt incident management reporting means absolute transparency and sharing of information with customers and the ability to implement security measures to prevent further instances.

No-one has implemented a SaaS SIEM like this yet. This software could easily be deemed unaffordable to many New Zealand organisations.

However, by NSP setting it all up and creating it as a service, it becomes readily available to many businesses.

“Technology typically the domain of large enterprises is now totally accessible to New Zealand SMEs meaning all businesses, large or small, can benefit from security intelligence and analytics to enable rapid detection, response and neutralising of cyber threats”, says Brent.

“Our goal is to take the cybersecurity concerns, workload and capitals costs away from businesses by providing a comprehensive end-to-end solution.”

Why outsource your company’s security?

State of the art technologies and seasoned security pros at affordable prices. In other words; cost, resources, skills, complexity and scale.

The simplest and safest way to ensure your cyber-safety is to leave it to the experts, because a cyber war is one where a lack of preparation can and will lead to your defences being largely outgunned.

Article by Simone de Cunha, Communications Consultant and Technical Writer

Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
SingleSource scores R&D grant to explore digital identity over blockchain
Callaghan Innovation has awarded a $318,000 R&D grant to Auckland-based firm SingleSource, a company that applies risk scoring to digital identity.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Spark Lab launches free cybersecurity tool for SMBs
Spark Lab has launched a new tool that it hopes will help New Zealand’s small businesses understand their cybersecurity risks.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.