Vigilant Cyber Security

Posted by Henry Roberts on Mar 6, 2018

Cyber DNA by Vigilant Technology

Operational need + Control (FW, AV Compliance) + Visibility

Today’s world doesn’t raise a question of the Cyber Security necessity. Being reckless about your data protection either on a personal or business level is not an option anymore. Luckily, there’s plenty of offerings on the market for any budget and any level of protection.

When it comes to your business data protection, the risk is as high as your reputation and your customers’ security. A lot of businesses that prioritize Cyber Security over the other things are allocating significant budgets to be ahead of the game with the newest protection technology and continuously evolving hacking technology. It is frustrating when you keep investing in technologies and don’t get to see huge improvements.

The problem is that most of the Cyber Security solutions are:

  • Catching the “bad guy” when the incident has already happened
  • And are visible for the hackers, so they can adapt to it.

The key to a truly effective Cyber Security is to gain visibility and control over everything that is about to enter your network and at the same time to remain invisible to the attackers.

What Cyber Security for business usually looks like

  • Vulnerability Assessments
  • Penetration Tests
  • Compliance
  • Firewalls IDS/IPS
  • Anti-Virus
  • Logging Solutions – SIEM

This is the typical list for most of the cyber security solutions for businesses and it seems concrete. This set has its weaknesses, though:

  • It’s expensive and hardly keeps up with the changes
  • It can only detect something it already knows and is helpless in front of the new threats
  • The average detection time (Dwell Time) is 8 months
  • Hackers know the requirements for most of such systems

Cyber DNA

LANtelligence is a partner of Vigilant Technology Solutions that offers the new way of cyber protection called CyberDNA.

The CyberDNA Network Security Monitoring Service reduces an organization’s overall cyber risk by proactively monitoring the customer’s network for signs of anomalous activity indicative of active compromises, misconfigurations, or other notable security risks. In short, we help your team reduce the average time for incident detection from years and months down to minutes and hours. Quick detection and response reduce breach impact and incident response costs while protecting the organization’s reputation and reducing brand damage. CyberDNA creates a detection layer that remains invisible for attackers and controls the data movements in both ways. It means that unusual data or its behavior will be detected before it enters or leaves your network.

  • Completely inaccessible to attackers
  • Does not degrade your traffic speeds
  • Monitors your traffic in real-time
  • Verifies if prevention assets are working and if endpoints are trusted.

Request Cyber DNA 5-day evaluation trial


Read More

Tags: Vigilant, Cyber Security

Firewall And Endpoint Protection

Posted by Henry Roberts on Feb 14, 2018

What You Can Trust If Not the Firewall?

For a long time, we have been comfortable believing that our firewall/IPS is protecting us from outside attackers. Now we know that it is not always the case. With the release of the NSA and the CIA’s hacking tools we have found that many popular firewall/IPS manufacturers' devices had long standing vulnerabilities that were actively being exploited. 

Even the largest companies in the world are not able to avoid hacks against their system. Many fail to realize an attack occured until months later. There is no endpoint protection for your Internet of Things devices like printers, TVs, routers, lights, firewalls and sensors. Until the manufacturers of these often-inexpensive devices can properly protect them, those devices will remain a constant threat to the internet today and to your network tomorrow.

Juniper and Cisco, two of the most popular firewall vendors, had secret backdoors that were being exploited. The ASA hack was just as bad, allowing remote code to be put and run on an ASA without even needing a username or password. Who can you trust if you can’t trust the firewall?

Read Case Study: Cyber Security For Retail

Traditional anti-virus and a firewall in the enterprise is no longer good enough. More and more devices on the network do not allow for any endpoint protection and they are being compromised at an alarming rate. The only way to find threats like these is to closely monitor the firewall traffic on both sides of the device. 

Buying and setting up a firewall and endpoint protection won't protect your network from modern threats. We assume that when we purchase security devices like firewalls or IPS/IDS that the devices themselves are proof against being hacked. This is not the case though. We must implement a new method to ensure that our security devices can be trusted by verifying and constantly monitoring for threats. You need a security team that will catch the things getting through traditional layered protection approaches. 

There is a solution in the market that does exactly that, It's called CyberDNA Network Security Monitoring Service by Vigilant Technology. They monitor the traffic on both sides of your firewall before it enters of leaves your networkTheir US-based cyber security hunt teams examine the traffic for anomalies and will find and alert you when the unauthorized remote access takes place. 

Schedule a CyberDNA demo today to see what this product can do to enhance your security posture. The CyberDNA demo is a live 5-day Proof of Vigilance that reveals what is coming in and going out of your network at no charge and with no commitment. 

Read More

Tags: Vigilant, Cyber Security