When combating targeted attacks, one of the primary issues businesses face is an inability to correlate anomalous events in their IT environment with current, accurate, and actionable security intelligence, making it difficult to determine if and where a threat exists. Because malware is typically a component of these advanced attacks, it is also critical that businesses understand the behaviour of applications running on their endpoints, and the reputation of files entering their environment.
BrightCloud Security Services redefine online threat intelligence. The suite of cloud-based services, powered by a self-learning threat analysis platform that continuously scans the internet, is designed to help enterprises and OEM technology partners strengthen their security technology with accurate and actionable threat intelligence. The enhanced suite includes a new File Reputation Service and an enriched contextual database that correlates previously disparate security data points.
Traditional, reactive, list-based security that works by recognizing known threats is powerless to stop modern malware that is purpose-built to attack a single target. Brightcloud Security Services use a new three-dimensional approach threat intelligence to identify and stop these sophisticated threats. This approach includes:
- Breadth of services to cover all critical threat sources – internet, file, and mobile
- Cloud-based big data architecture with real-time threat intelligence
- Greater depth of analysis by correlating disparate data.
All of these services leverage the vast security intelligence of the cloud-based Webroot Intelligence Network, which continually captures, analyses, classifies, and publishes intelligence on URLs, IPs, mobile apps and files; and analyses not only behaviour, but also correlates relationships to reputable and malicious websites, IPs, files, and mobile apps through a proprietary correlation engine.
The BreachLogic Endpoint Agent delivers the same cloud-based threat analysis in a next-generation endpoint security solution for clients, servers and mobile devices. It provides early detection and blocking of advanced malware attacks and enables rapid investigation and remediation in the event of a breach. By monitoring endpoint applications, processes and events against Webroot threat intelligence, it recognizes and stops never-before-seen threats that can pass unchecked by existing network and endpoint security technology.
Designed to integrate into the existing IT environment, the BreachLogic Endpoint Agent complements network security technologies and endpoint antivirus, providing an additional layer of protection against attacks that infiltrate or bypass the network perimeter.
The BreachLogic Endpoint Agent’s continuous monitoring provides visibility into endpoint applications, events, and processes and applies real-time behavioural and contextual analysis from the Webroot Intelligence Network to identify existing breaches and prevent future attacks. Security teams can easily manage endpoint alerts with the web-based Webroot console or integrate Webroot endpoint data into their existing management environment. The BreachLogic Endpoint Agent also provides detailed forensic data to assist security teams investigating the source and scope of a breach to identify vulnerabilities and prevent future infiltration.