Cynet Announces Free Incident Response Tool to Validate, Understand and Remove Active IT Security Threats
Cynet announced the Cynet 360 Incident Response Tool. The no-charge solution was developed for incident response service providers and enterprises to ensure the fast identification and remediation of cybersecurity attacks.
Because time plays a critical role in incident response, methods are required to optimize and accelerate the timeframe between initial check and complete threat removal. The Cynet 360 security platform provides powerful incident response capabilities to validate suspected breaches quickly and respond to confirmed threats using automated threat discovery to radically reduce manual investigation time. The SaaS-based tool is capable of covering thousands of corporate endpoints in minutes.
‘We see that many organizations and service providers struggle to get the threat visibility they require,” said Eyal Gruner, co-founder and CEO of Cynet, “IR is an extremely time sensitive process. Therefore, having the required threat visibility up and running in minutes is a must.”
Juniper Research estimates that “the quantity of data stolen by cybercriminals could rise by as much as 175 percent over the next five years. Add to that uncertainties in the global economy and 2019 looks set to be a challenging year for cybersecurity professionals.” *
With the fast and seamless deployment of Cynet 360, administrators can conduct automated threat discovery and perform remediation actions promptly. Capabilities include:
• Full Environmental Visibility: Gain instant visibility into any host, file, process, logs, network traffic or user activities. Acquire verdict, attack scope, and all indicators immediately. Use the solution’s central management to distribute other open source IR tools across the environment.
• Precise Threat Knowledge: Get accurate, real-time threat knowledge auto-generated by the Cynet 360 correlation engine. Conduct deep-dive investigations and leverage granular forensic tools to conduct end-to-end investigations. Proactively hunt for threats using known and local IOCs.
• Complete Remediation Actions: Isolate infected hosts, disable compromised user accounts, remove malicious files and block risky network connections. Craft custom remediation policies for automated threat blocking and removal.
“Sound incident response is a must-have capability for the enterprise today,” noted Gruner. “While there are no silver bullets to stop all attacks, having the right tools in place will put the organization in a higher state of readiness and provide for greater resilience against future threats.”
* Juniper Research, 10 Cybersecurity Trends to Watch for in 2019, January 2019