The human dimension of cybercrime
It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.
While traditional cybersecurity tactics focused on rules established around the common patterns of usage on the enterprise network, today’s best practices go well beyond that approach.
OpenText’s Managed Extended Detection and Response (MxDR) provides active surveillance across your entire IT infrastructure—well beyond your network endpoints—and employs observed tactics, techniques, and procedures (TTPs) that have been customized for your specific environment. By applying advanced analytics and machine learning to those TTPs, OpenTextTM delivers rapid identification and remediation.
Getting to the human factor
Basic behavior-centric cybersecurity, also known as user-behavior analysis (UBA) involves understanding how human beings interact with data. Combining analytical information from traditional security systems with contextual data from other sources—travel logs, email, chat communications and more—allows us to draw a virtual profile of an individual user and their behavioral patterns. By detecting anomalies in these patterns, OpenText can identify potential threats, including malicious insiders or external bad actors.
Behavioral analysis takes cybersecurity far beyond the realm of traditional perimeter defences, using cognitive science, human behavioral analytics, and human psychology to understand how humans work and interact with technology.
OpenText MxDR is not your standard-issue UBA.
For us, understanding the human behavior behind cybercrime is just the beginning.
OpenText MxDR leverages multiple technologies, including threat intelligence, with our next-generation security information and event management (SIEM) to completely understand the scope and impact of any security event. Threat intelligence also allows the correlation to be drawn between data sets of known malicious files and data points identified from ingested log sources.
The more data we have, the more data sets we can analyze and conduct threat hunting. When we see something happening in one of our environments, we sweep through all our client’s data to make sure it doesn’t exist elsewhere. We utilize 500+ detection sets within your environment, as well as more than 285 million sensors across the public Internet, to provide real-time, multi-point threat detection.
Once OpenText MxDR identifies TTPs related to a new malware that’s targeting a particular environment we can apply that TTP to all our clients and notify them immediately. We fully integrate OpenText BrightCloud Threat Intelligence into our MxDR platform, which provides valuable loopback information.
Having threat intelligence directly integrated allows for immediate threat validation to known malware. In addition, endpoint and network technologies are integrated into the solution with people, processes, and procedures in the event of a zero-day or targeted event.
It all amounts to thorough, far-reaching threat detection, rapid remediation, and a massive decrease in the number of false positives that divert your security analysts from their other tasks.
While it once was sufficient to understand “normal” usage on your network, and simply respond to anomalous behavior, organizations must now be aggressively proactive to avoid cybercriminals from breaching their infrastructure. Understanding threat actors’ tactics, and staying one step in front of evolving TTPs is now essential, as is the ability to quickly apply that information across entire attack surfaces.
OpenText MxDR’s threat hunting approach offers unparalleled protection, and multiple benefits, including:
- Preventative, proactive support to identify or validate the existence of threats and/or malicious activity within and across the cyber kill chain.
- Quick identification of patterns, relationships, and indicators of compromise.
- Insight to potential zero-day threats before they can attack the environment, both on-premises and in the cloud using AI and machine learning tools.
- Threat hunting beyond network logs to cover endpoints and expand security measures.
- Remediation and risk compliance recommendations to close gaps in security protocols and policies.
With threat actors constantly gaining new skills and tactics, and sharing their discoveries with other cybercriminals, every organization must bring their best game to the challenge.
It’s an ever-shifting threat environment, and organizations must stay in front of those who want illegitimate access to data.