Cisco today unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.
Cisco announces the addition of AMP Threat Grid to the Cisco® Advanced Malware Protection (AMP) portfolio, which integrates innovation acquired through last year’s acquisition of ThreatGRID. This integration provides the latest malware threat intelligence and dynamic malware analysis capabilities, both on-premise and in the cloud, that strengthen Cisco AMP’s continuous analysis and zero-day detection capabilities. In addition, Cisco is introducing Incident Response Services that equip organizations with teams of information security experts that utilize threat intelligence and best practices for readiness and response from network to endpoint to cloud.
As dynamic as the modern threat landscape is, there are some constants; adversaries are committed to continually refining and developing new techniques that can evade detection and hide malicious activity. This is evident by the 250 percent increase in malvertising attacks as cited in the Cisco 2015 Annual Security Report. Additionally, the report continues to show that enterprises are in a persistent state of infection, showing that 100 percent of networks analyzed had traffic going to websites hosting malware.
New threat intelligence, dynamic malware analysis and retrospective security capabilities for Cisco AMP enhance protection across the attack continuum. These capabilities, which now include the integration of AMP Threat Grid, are deployable across the extended network including endpoints, mobile devices and virtual systems, as well as Cisco Web and email security appliances.
New Dynamic Malware Analysis and Threat Intelligence
- AMP Threat Grid provides dynamic malware analytics and threat intelligence. These advanced capabilities are provided as a standalone cloud service or via new UCS based on premise appliances. AMP Threat Grid analytics engines provide security teams with breach detection against advanced malware, allowing them to quickly scope and recover from a breach by providing context-rich, actionable threat intelligence.
- Vulnerability visibility and prioritization: AMP for Endpoints brings additional visibility to the extended network by providing a list of hosts that contain vulnerable software, a list of the vulnerable software on each host, and the hosts most likely to be compromised. Powered by Cisco threat intelligence and security analytics, AMP identifies vulnerable software being targeted by malware and the potential exploit, and provides customers with a prioritized list of hosts to patch.
Enhanced Retrospective Security Capabilities
Unique to Cisco AMP, the solution continuously records and analyzes file activity at and after initial inspection. If a file exhibits malicious behavior after the fact, retrospective security rolls back the tape to see the origin of a potential threat and the behavior it exhibited, and provides built‐in response capabilities to contain and eliminate the threat.
- Endpoint Indicators of Compromise (IoCs): Security teams can now perform deeper levels of investigation on lesser known advanced threats specific to applications in their environment by directly submitting Endpoint IoCs to Cisco AMP.
- Low Prevalence: Further empowering security teams to quickly scope and understand targeted attacks, AMP for Endpoints can now display files that have been executed across the organization ordered from lowest to highest number of instances. Customers also have the ability to submit identified low prevalent files for dynamic malware analysis for even greater visibility and context, either manually or automatically by policy. This set of capabilities can help surface previously undetected and targeted threats that were only seen by a small number of users.
Cisco Security Incident Response Services: Threat Protection Expertly Applied
There is a widening gap between the availability of expert security practitioners and the industry’s needs, as companies lack both funding and manpower to adequately protect assets and infrastructure. Chief Information Security Officers are increasingly looking to external experts for security guidance.
Utilizing threat intelligence from the Cisco Talos Security Intelligence and Research Group, AMP and the expertise of the Cisco Security Solutions (CSS) team, the Incident Response Services group works with organizations to identify the source of infection, where it entered the environment, and what data was compromised. By utilizing Cisco security products like AMP, the incident response team is able to find the source – patient zero – and identify malware movement throughout the environment, allowing organizations to minimize the cost and overall impact of any breach, as well as identify methods to reduce future risk. The Incident Response Services supports businesses in two areas:
- Cyber Attack Response: Every event is unique and Cisco Security Incident Response methodology provides expedience and allows for flexibility to continuously adjust to the dynamic threat landscape. Whether it’s an insider threat, distributed denial of service, advanced malware at the endpoints or customer data breach, the team guides an organization through identification, isolation and resolution using Assessment, Analysis and Data Mining; Forensic Image Analysis; Infected System Dynamic Instrumentation; Malware Reverse Engineering and Exploit Analysis and Re‐Implementation.
- Cybersecurity Readiness: As businesses fall victim to increasingly targeted cyber-attacks and data breaches, they need external expertise to assess and promote security best practices as well as to protect corporate data and prepare for the inevitable data breach incident. Cisco Incident Response offerings span infrastructure breach preparedness assessments, security operations readiness assessment and breach communications assessments among others.