SUNNYVALE, CA -Marketwired – Jul 18, 2016. SafeBreach, a leading innovator of continuous security validation, today announced that it has integrated its platform with FireEye iSight Intelligence. Infusing real-time threat intelligence feeds and transforming them into breach simulations empowers SafeBreach and FireEye customers to quickly validate the potential of — and take preventive action against — cyberattacks that are impacting peers in their industry.
According to the Gartner report, “Designing An Adaptive Security Architecture for Protection from Advanced Attacks” by Neil MacDonald and Peter Firstbrook, published in Feb 2014 and refreshed in January 2016, “Comprehensive protection requires an adaptive protection process integrating predictive, preventive, detective and response capabilities.” The report states, “based on reconnaissance of hacker attention, hacker marketplaces and bulletin boards; on vertical industry interest; and on the type and sensitivity of the data being protected, this category is designed to proactively anticipate future attacks and targets so that enterprises can adjust their security protection strategies to compensate.”
The SafeBreach ability to weaponize threat intelligence and truly understand the activities that represent specific priority threats allows security analysts to dramatically improve their ability to anticipate future attacks, challenge their security defenses and train their security operations center (SOC) teams.
“As more and more attacks occur, organizations are turning to threat intelligence for early attack notification, but on its own, threat intelligence can exacerbate the problem by overwhelming analysts with data that is out of context,” said Itzik Kotler, CTO and co-founder at SafeBreach. “The SafeBreach threat intelligence integration enables the average organization to understand how applicable indicators of compromise would play out in their environment in a practical, actionable and proactive manner.”
“The combination of FireEye iSIGHT Intelligence’s ability to help organizations understand their adversaries and how to defend against them with SafeBreach’s technology that turns intelligence into simulations is extremely powerful,” said Ed Barry, VP of Cyber Security Coalition at FireEye. “We are excited to offer our joint customers this new way to proactively defend their networks.”
SafeBreach with FireEye iSIGHT Intelligence integration offers a number of important benefits, including:
- Provide greater understanding of which compromise indicators correlate to an organization’s risk profile;
- Proactively address attacks that are being seen by the industry;
- Improve analyst detection and response within security operation center (SOC) teams; and,
- Validate the efficacy of threat intelligence feeds
The SafeBreach centralized management system incorporates the complete Hackers’ Playbook of breach methodologies, and manages a distributed network of breach simulators from a centralized location. SafeBreach simulators perform the role of the attacker, simulating traffic within the cyber kill chain. For example, to simulate breach methods for a Payment Card Industry (PCI) credit card exfiltration use case, breach methods are executed between simulators placed in the PCI segments and other segments, including the cloud and Internet.