Cadastre-se agora para um orçamento mais personalizado!

NOTÍCIAS QUENTES

Unifying Your Detection and Response Efforts

Mar, 28, 2024 Hi-network.com

As attacks become more sophisticated, it takes security teams longer to investigate and respond to cybersecurity incidents. That's why it's critical for organizations to maintain comprehensive real-time visibility while streamlining their analysis and response processes, strengthening any network weak spots that can be exploited by threat actors. Alerts across disparate security tools and the network result in costly, long investigations that may go unnoticed while attackers conduct their operations.

Gone are the days when teams could deploy various point products to separately manage critical security components deployed across their sprawling networks. A new, more holistic approach is required. These challenges require unifying network detection and response (NDR), endpoint detection and response (EDR), and next-generation firewall (NGFW) capabilities to ensure faster incident investigations and response times without negatively impacting SOC productivity.

Watch the below video to see how FortiNDR Cloud integrates with FortiGate NGFWs.

Prioritize threats and fuel response with combined network and endpoint visibility

The FortiGate NGFW, FortiNDR Cloud, and FortiEDR integration brings network and endpoint data together, providing security teams and threat hunters with enriched, high-fidelity detections and expedited investigation and response. This is achieved by automatically correlating and analyzing security events from two data sources-NDR behavioral network traffic analysis with EDR host context and attack isolation using FortiEDR and FortiGate NGFW-to help spot any evidence of malicious behavior early in the attack life cycle and decrease incident investigation and response time across on-prem and cloud environments.

FortiNDR Cloud Visualizer shows active detections and their associated endpoints.

These integrations help organizations build a cohesive platform to create end-to-end visibility and defend against threats wherever they are encountered-from the network to the cloud and across endpoints. The integrated solution facilitates sharing contextual information and indicators of compromise to help security teams become effective, resulting in a well-coordinated response and remediation strategy.

The Benefits of a Combined Solution

  • Full historical attack visibility: An attacker cannot manipulate network metadata. This provides analysts with an immutable "source of truth" for the most sophisticated attacks. By correlating FortiEDR and FortiNDR cloud data and applying AI/ML and expert analysis to spot threats, analysts gain a comprehensive and accurate view of attack activities, such as network reconnaissance, port and network scanning, password guessing, use of stolen credentials for lateral movement, and command-and-control activity, as well as in-progress attack intel. FortiNDR Cloud retains rich network metadata for 365 days, enabling comprehensive investigations and historical visibility. This data ensures that newly discovered tools, tactics, and procedures can be retroactively investigated to determine if threats may have infiltrated the customer's network. 
  • Detect threats hiding in encrypted traffic:Attackers increasingly use encrypted traffic, combining malicious activity with routing network traffic to conceal their activity. To meet this challenge, security teams can leverage FortiGate decryption or any other decryption tool and use FortiNDR to inspect SSL/TLS traffic, matched with FortiEDR endpoint data to detect and investigate a wide range of attack TTPs.
  • Real-time endpoint visibility and complete asset inventory:Discover any device connected to the network, including unmonitored OT/IoT devices, and shadow IT endpoints not covered by other security controls.
FortiNDR Cloud pulls endpoint data from FortiEDR and allows analysts to isolate affected IPs.
  • Reduced mean time to respond: With tools like parallel hunting and guided playbooks, analysts can conduct wide-reaching investigations, trigger endpoint isolation, or ban malicious IPs directly from the FortiNDR Cloud console using FortiEDR or FortiGate NGFW. Combining multiple Fortinet technologies through the Fortinet Security Fabric platform offers unique benefits beyond simplified management. Enriched, combined telemetry decreases investigation times and streamlines remediation steps through a single interface.
The FortiNDR Cloud and FortiGate NGFW integration allows analysts to ban affected IPs.
  • Reduced false positives:The FortiEDR and FortiNDR Cloud integration helps reduce false positives. When investigating suspicious communications, the analyst will be presented with endpoint data queried from FortiEDR. In cases where the endpoint process that generated the connection to a URL is a browser, which typically is not a malicious activity, the information will be provided to the analyst. In cases where the process that generated the URL connection is not a browser, FortiNDR Cloud will immediately identify it as suspicious. In this scenario, the integration helps analysts distinguish between suspicious but legitimate activity, false positives, and substantiated malicious activity. An analyst can use a FortiNDR Cloud playbook to investigate all communications to the malicious URL through FortiEDR and FortiGate NGFW.
Integrations enable real-time network threat detection with endpoint security and NGFW attack isolation.

Learn More About the Fortinet Security Fabric Platform

This integration of FortiEDR and FortiNDR data with FortiGate NGFW is just one example of how Fortinet products and services can be used together through the Fortinet Security Fabric platform to enhance daily operations, streamline detection and response processes, and derive even greater value from those investments. Learn more about the Fortinet Security Fabric platform today.

tag-icon Tags quentes : Business and Technology network detection and response

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.
Our company's operations and information are independent of the manufacturers' positions, nor a part of any listed trademarks company.