Cynet to introduce integrated XDR, MDR and response automation

Cynet announced the future of extended detection and response with the launch of Cynet 360 V4.0. The new generation autonomous breach prevention platform now features XDR, 24/7 Managed Detection & Response (MDR) and full Response Automation, improving cyber threat detection accuracy while reducing the complexity and overhead required for comprehensive defense and mitigation of sophisticated and subversive cyber-attacks.

Cybersecurity professionals now deploy multiple prevention and detection technologies to defend an endless variety of vulnerabilities and attacks to endpoints, networks, users and data. While these tools generally do a fine job preventing and detecting the vast majority of cyber-attacks, Cynet says they continue to miss the edge cases – the difficult to identify attacks that slip through the cracks between these point solutions. Visibility across the environment and understanding the context of security data and alerts is required to solve this complex problem.

According to Gartner, “Extended detection and response (XDR) solutions are emerging that automatically collect and correlate data from multiple security products to improve threat detection and provide an incident response capability. For example, an attack that caused alerts on email, endpoint and network can be combined into a single incident. The primary goals of an XDR solution are to increase detection accuracy and improve security operations efficiency and productivity.”

Cynet 360 V4.0 aims to set new standards in the cybersecurity space. Advanced capabilities include:

  • Full threat visibility: Cynet 360 V4.0 provides complete visibility across the entire environment. The detection power achieved by natively combining signals and data from multiple sources simply cannot be matched by siloed, point protection solutions. Even the most subversive attacks are fully exposed with pinpoint accuracy by Cynet.
  • Complete cyber threat prevention and detection: Cynet 360 V4.0 provides multiple, integrated prevention technologies to block standard and advanced attacks across the environment. Deception technology is also built-in to entice cybercriminals that have penetrated the network into exposing themselves before they do real damage.
  • Incident orientation: Centralising the signals from multiple detection sources allows Cynet 360 V4.0 to group related alerts and data into incidents. Incidents include all related alerts and indicators of compromise (IOCs) related to an attack and fully automates root cause analysis, threat impact determination and remediation actions.
  • Response automation: Cynet 360 V4.0 provides fully automated response tools for cross-environment investigation and remediation. Investigations are fully automated – first determining the root cause and then analysing the full breadth and impact of the threat.

New to Cynet 360 is the unique and insightful Incident Engine(1), an automated response capability that produces a visual map of an entire incident investigation and response. In as little as five minutes, the advanced tool automatically performs a full incident response workflow, including root cause analysis, full threat impact determination and all necessary remediation actions – significantly reducing the mean total time to contain and eliminate real threats.

Complementing the Cynet 360 V4.0 offering is the addition of the CyOps 24×7 detection and response services team. CyOps is a team of world-class cybersecurity experts that continuously monitors all Cynet customer environments 24/7 to ensure any attacks are uncovered, provides ad-hoc threat investigations and forensic analysis, and guides users through any necessary remediation steps.

“Because cybercriminals find ways to circumvent the cocktail of security solutions in place by most organisations, we are answering the call to strengthen and simplify the process,” said Eyal Gruner, CEO and co-founder of Cynet. “Cynet 360 V4.0 provides the security operations centre (SOC) with a complete view of cyber threats to applications, endpoints, system networks and overall IT infrastructure where automated processes are executed to detect, analyse, hunt, and thoroughly resolve threats.”

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Panasonic and Jasmy unveil Web3 Platform for IoT data control

Posted on: March 28, 2024

Panasonic has joined forces with Jasmy (JASMY) blockchain to introduce a Web3 platform that will facilitate the connection of personal data on the Internet of Things (IoT). The collaboration between the Japanese-based blockchain and Panasonic Advanced Technology was initiated in February, but the official announcement was made on March 26.

Read more

Driving connected personalised user experiences with Generative AI

Posted on: March 27, 2024

As the world continues to rapidly move towards digitalisation, customer expectations are also on the rise. Around the globe, telcos are grappling with meeting these expectations. As well as ensuring connectivity in a secure, seamless, and consistent manner 24/7, to compete and differentiate, operators now need to provide personalised experiences that are as unique as

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more