“Leveraging threat intelligence from multiple sources offers maximum protection from advanced threats,” said Rekha Shenoy, vice president of business and corporate development for Tripwire. “These integrations are a key part of Tripwire’s commitment to delivering comprehensive solutions that make it possible for security teams to reduce the time needed to both detect and respond to elusive, advanced threats.”
By correlating and comparing Tripwire’s trusted endpoint intelligence with multiple sources of threat intelligence at machine speed, this expanded adaptive threat protection provides users with the necessary context to discover and respond with precision to both known and unknown cyber threats. The Tripwire solution integrates peer and community threat feeds, leveraging STIX and TAXII standards, as well as a variety of commercial threat intelligence services. These services identify Indicators of Compromise (IOCs) associated with advanced and zero-day threats. The IOCs are automatically downloaded to Tripwire® Enterprise and analyzed to quickly identify any compromised assets, determine risk priority and accelerate remediation response.
Key features of adaptive threat protection integrations include:
Faster detection and analysis of zero-day and advanced persistent threats (APTs).
Automatic, immediate analysis of IOCs, suspicious files and malware.
Proactive alerts prioritized by business context and speed response time.
Definitive detection of anomalous system and file changes using proven Tripwire change detection technology.
Support for STIX and TAXII standards.
Optional automatic adjustment of configuration settings to harden assets against specific threats.
The AV-TEST Institute registers over 390,000 new malicious programs every day, and according to a recent Ponemon Institute report, 68 percent of IT and IT security practitioners involved in defensive efforts against APTs said zero-day attacks are their organization’s greatest threat. The longer malware and targeted attacks remain undetected, the more time cybercriminals have to infiltrate corporate and government networks.
“The unfortunate reality is that organizations are continually under attack by sophisticated threats specifically designed to evade detection,” said Wendy Nather, research director for security at 451 Research. “Even organizations with substantial security investments are looking for automated solutions that can apply the information from threat intelligence feeds to their specific network and business challenges.”