fbpx

Andrew Hamilton, Cybriant CTO, to speak at KSU

Andrew Hamilton has been selected to speak in the current IS Department speaker series at Kennesaw State University. In his presentation “Do what works, not what’s flashy,” he will discuss information overload, building a security foundation without hype, what to do and why it works.

He will discuss developing a security program which will include:

• Turning your average joes into information security heroes with security awareness training
• Patch early, patch often
• Privileges – not everyone should be an administrator
• Endpoint protection – extends past the firewall
• Importance of network segmentation
• Infrastructure intelligence – knowing how to detect the attack

The event will be held Thursday, April 12. For more details go to https://owllife.kennesaw.edu/event/1694173

HAWK Network Defense Announces Partnership with Cybriant

Today, HAWK Network Defense announces a partnership with Cybriant to provide cyber-risk management services to support the growing HAWK.io customer base. HAWK.io is the industry’s first cloud-based, multi-tenant big data security analytics (BDSA) platform. Cybriant’s Incident Response service and skilled professionals help organizations reduce the chance of incidents escalating into a crisis. Together HAWK and Cybriant bring real-time security analytics and professional support services in a cloud-based offering.

As the market moves to the cloud, the focus for cybersecurity services organizations shifts away from traditional reselling and implementation of security software and hardware and turns to services focused on incident monitoring, response, and management for clients. Organizations making strategic decisions to embrace cloud-based IT services and transition away from on-premise solutions are faced with a decision. Go with the standardized services of a traditional MSSP, or select a multitenant, cloud-based BDSA solution such as HAWK.io where they get a customized user experience. For the customer, this partnership with Cybriant fills the gap between incident detection and incident response with trained security professionals monitoring, researching and managing incidents with the customer to mitigate risk.

With HAWK.io, each subscriber individually benefits from HAWK.io’s patented artificial intelligence and security analytics technology to provide the most accurate real-time detection, validation, and prioritization of true security incidents. HAWK.io’s analytics engines deliver highly reliable security incidents to Cybriant’s experienced security professionals providing greater efficiency and effectiveness in responding to and mitigating threats to customer’s systems and data. Cybriant’s services will include customer onboarding to HAWK.io, as well as consulting and incident response/management services.

“Managing cyber incidents successfully requires two things – the right technology and the right expertise. Hawk.io provides in-depth analytics that can filter the noise of level 1 alerts enabling our analysts to identify real threats faster,” said Bill Brown, SVP of Cybriant. “Combining the Hawk.io technology with Cybriant’s 24×7 security monitoring creates a more effective team of incident responders which makes our clients more secure.

“The combination of HAWK.io’s highly accurate analytics Cybriant’s prowess in cybersecurity incident response services is a powerful solution for customers who are looking for comprehensive cloud-based cyber risk mitigation. HAWK.io automates the triage of security incidents effectively, allowing Cybriant’s experienced security experts to focus on mitigating the most critical risks first,” says David Harris, CEO of HAWK Network Defense.

For more information, contact:
Reed Harrison
HAWK Network Defense, Inc.
http://www.hawkdefense.com
rharrison(at)hawkdefense(dot)com

About Cybriant
Cybriant assists companies in making informed business decisions and sustaining operational effectiveness in the design, implementation, and management of their cybersecurity programs. We deliver a comprehensive and customizable set of strategic and adaptive cybersecurity services which address the entire security landscape. These services include assessment and planning, testing and hunting, SIEM management and security monitoring, perimeter and endpoint protection, and secure cloud networking. Cybriant also delivers support services for the secure maintenance, relocation, and disposition of physical and data assets. We make enterprise-grade cyber security services accessible to the Mid-Market and beyond. For more information, go to https://www.cybriant.com

About Hawk.io
HAWK Defense offers HAWK.io, the first true multi-tenant, cloud-based BDSA platform that provides leading-edge BDSA functionality for an affordable subscription-based pricing model. HAWK.io is designed to have fast and simple onboarding of users and devices helping customers avoid lengthy, expensive deployments and results in rapid time-to-value.

HAWK.iotm provides an innovative Big Data Security Analytics (BDSA) platform that allows enterprises to identify, validate and prioritize true security incidents. HAWK.io is the natural evolution of legacy SIEM to Big Data Analytics. The cloud-based solution features a massively scalable architecture that delivers high-speed data ingestion and a highly efficient patented analytics engine. HAWK.io customers benefit from rapid installation and setup times, simple administration, out-of-the-box analytics, and dynamic threat intelligence feeds. Learn more about HAWK.io at http://www.hawk.io or by visiting the company on Twitter and LinkedIn.

In The News: Cybriant’s PREtect Combines People, Processes And Technologies To Deliver An Effective Cyber-Security Program

Cybriant CTO, Andrew Hamilton, was recently interviewed about PREtect. Read the full article here.

UPDATE: PREtect has been rebranded to CybriantXDR. Read more here: https://cybriant.com/cybriant-xdr/


Cybriant’s PREtect Combines People, Processes, And Technologies To Deliver An Effective Cyber-Security Program

Cybriant provides cyber risk management and cybersecurity services to companies of any size. They have recently released a new PREtect product suite, an integrated stack of managed security services designed to reduce exposure to the most common and voluminous cyber threats. The PREtect service provides a comprehensive solution incorporating people, processes, and technologies to deliver a solid foundation for an effective cyber risk management program in an affordable manner.

Below is our interview with Andrew Hamilton, CTO at Cybriant:

Andrew_Hamilton

Q: What was your inspiration for creating PREtect?

A: Over and over, even in the most resourced enterprises, we see security failures arising from what we dub poor environmental hygiene; unpatched systems, poorly informed personnel, slow response to known vulnerabilities. The Equifax breach and the Wannacry attack are two classic examples of the consequences of these failures, and the type of incidents PREtect is designed to thwart.

PREtect accomplishes this by addressing five key fundamental elements. Continuous training of employees to strengthen awareness and skills in identifying malicious behavior. Continuous vulnerability management to minimize the time to discovery of technical vulnerabilities within the environment. Consistent patch management to responsively eliminate technical vulnerabilities once they are identified. Continuous monitoring and management of endpoint security to stop attacks from spreading to the enterprise. Vigilant security monitoring of critical assets to detect persistent threat actors before they can do harm. Combined and effectively performed, these services can greatly shrink the threat landscape any and every business faces.

Cybriant PretectRecommended: Premier Legal Marketing: On The Cutting-Edge Of Any New Technologies To Help Law Firms Grow

Q: Who is your ideal client and why?

A: Any company that is connected to the internet and needs to properly implement a cyber risk management program, or at minimum reduce its risk of becoming the victim of an attack.

Cybriant_ProcessRecommended: QuanticMind Raises $20M Series B Funding To Fuel Its Product Development In The Future

Q: What size business could benefit from PREtect?

A: Business size is somewhat inconsequential. The question is how can a business most effectively and affordably address this business need? For most businesses utilizing a service delivered by experienced professionals will be more functionally effective, and will cost less in time and money then trying to build, manage, and maintain these capabilities in-house.

Find out more about PREtect: https://www.cybriant.com/pretect/

 

Cybriant in the News: PREtect Spotlight

 

UPDATE: PREtect has been rebranded to CybriantXDR. Read more here: https://cybriant.com/cybriant-xdr/

Cyber security has been deemed as one of the biggest concerns for small businesses owners when it comes to protecting their digital assets. Cybriant is a holistic cyber security service startup which enables small and mid-size organizations to deploy and afford the same cyber defense strategies and tactics as the Fortune 500.

Their product suite, PREtect, contains 5 cyber risk management solutions designed to optimize the protection of data assets and the detection of malicious events by addressing the most common vulnerabilities in the enterprise. Utilizing leading technologies and seasoned security expertise, Cybriant delivers an affordable solution which addresses the most common yet challenging structural and operational security vulnerabilities. The services include: Comprehensive security monitoring with continuous, actionable threat intelligence; detect and deploy missing patches in one’s system; detect, identify, and contain advanced threats before they cause damage; full executive reporting with consistent detection and identification of vulnerabilities; and a Security Awareness Training and Simulated Phishing platform that will keep a company’s employees trained, with security top of mind. Any business, small or large is vulnerable today.

Read original article: https://tech.co/startup-spotlight-biometrics-car-grunt-work-2017-11

Cybriant announces PREtect®; New Integrated Cyber Risk Management Service

UPDATE: PREtect has been rebranded to CybriantXDR. Read more here: https://cybriant.com/cybriant-xdr/

 

Five essential cyber risk management services integrated into an affordable, flexible, subscription-based model

 

Alpharetta, GA – November 15, 2017 – Cybriant, a leader in cybersecurity services, today announced an integrated service offering called PREtect.  PREtect managed security services are designed to optimize the protection of data assets and the detection of malicious events by addressing the most common vulnerabilities in the enterprise.

“As we see in many highly publicized breaches, most result from the poor practice of fundamental processes or poor response to identified vulnerabilities.  Pretect is designed to address these weaknesses,” said Jeff Uhlich, CEO of Cybriant. “The integration of these practices and technologies in the hands of experienced professionals can deliver more responsive functional value to organizations.  Especially those with limited technical or security resources.”

Utilizing leading technologies and seasoned security expertise, Cybriant delivers an affordable solution which addresses the most common yet challenging structural and operational security vulnerabilities. These services harden client computing environments and help reduce the risk of loss due to breach.  PREtect ensures a sound security posture as well as compliance with government regulations and industry best practices for effective information security.

PREtect integrated managed services include:

  • Security Awareness Training
  • Real-time Vulnerability Management
  • Responsive Patch Management
  • Endpoint Detection and Response
  • 24×7 SIEM with Security Monitoring

Cybriant offers these services individually but recognized the enhanced value both in performance and cost efficiency an integrated stack of these services could provide its clients. To learn more about Cybriant PREtect and for pricing information, please go to www.cybriant.com/pretect.

###

About Cybriant

Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and adaptive cybersecurity services which address the entire security landscape. These services include assessment and planning, testing and hunting, SIEM management and security monitoring, perimeter and endpoint protection, and secure cloud networking. We make enterprise-grade cybersecurity services accessible to the Mid-Market and beyond.

Cybriant in the News – Into the Breach: Meeting the Cybersecurity Challenge

Cybriant was recently featured in an article on it.toolbox.com. See the original post here.

Maintaining network security is the greatest challenge facing the IT industry today. The threat landscape is complex and ever-changing, which leads many organizations to devote a large portion of their technology budget to hardening their defenses against cyber threats. Since many vectors of attack focus on known and unknown software flaws and hardware deficiencies, it’s impossible to make any network completely secure against every type of intrusion.

The good news is that there are a number of ways that businesses can protect their data and ensure that critical systems can withstand any potential breach. To do so requires a comprehensive approach from the user level, all the way up to datacenters and cloud services. By guarding against the most common types of attacks and preparing for recovery in the event of an incident, IT managers can thwart many threats and provide business continuity at all times. Here are the steps that should be taken.

End-User Training

Employees and network end-users are commonly targeted by hackers as a means of gaining entry into business networks. This is largely because of a lack of clearly stated security policies for them to follow, or a general misunderstanding of how their actions can impact the network as a whole. In order to prevent employees from being exploited, they need to be made aware of the kinds of security threats they may encounter. In general, they should be taught to spot and report incidents of:

  • Fraudulent Emails
  • Phishing websites and phone calls
  • Unsafe downloads
  • Browser Hijacks

A well-educated user base can help to prevent unauthorized access to business systems and reduce the whole network’s exposure to malware and ransomware infiltration. They can be the first, best line of defense against cyber threats of all kinds.

Network Monitoring

Since even well-trained employees will still occasionally make mistakes, and other vulnerabilities will always exist, it’s essential to monitor all systems to detect and respond to potential problems. This kind of undertaking can quickly overwhelm an IT department, though. It’s worthwhile to engage a professional monitoring company to handle the workload.

Companies like Cybriant have the dedicated monitoring infrastructure and expertise to make sure that all endpoints, servers, and network hardware are never left unprotected. It’s a comprehensive approach that analyzes network traffic, monitors system event logs, and checks for known hardware and software vulnerabilities. IT staff have access to a threat management console and are alerted to potential trouble so they can respond appropriately.

Business Grade Backup

If all else fails, it’s crucial to have reliable data and system backups to be able to recover from an attack. This is the best way to prevent long-term damage that can cripple a business. Network servers and workstations should be backed up as often as is practicable, based on the needs of the specific business. It’s a good idea to have bare-metal restore capability for any business-critical systems so that any compromised machine can be restored in whole with a single process. This eliminates the need for time-consuming rebuilds of affected hardware.

Meeting the Challenge

By taking these steps to protect a network, IT managers can rest a little bit easier, knowing that they’ve applied a top-to-bottom approach to security. It’s impossible to know exactly how threats will evolve in the coming years, but it’s a safe bet that these preventative measures will still be effective for a long time to come. The future of their businesses may depend on it.

 

Continue Reading: The Financial Industry’s Biggest Threat

Five essential cyber risk management services integrated into an affordable, flexible, subscription-based model.