Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Corelight Announces Integration for Microsoft Defender for IoT as a Data Source for the Platform

Corelight, provider of the industry’s leading open network detection and response platform, announced product compatibility with Microsoft Defender for IoT. Corelight is the first Microsoft NDR partner to take advantage of Defender for IoT’s cross-industry integration capabilities. Corelight customers can send data from deployed sensors to Microsoft 365 Defender, and in turn Defender for IoT to apply its behavioral analytics and machine learning techniques to discover and classify devices and to protect, detect, and respond to IoT attacks. This also enables Defender for IoT to apply its global IoT and OT threat intelligence.

Read More About AI News : Nucleus Research’s 2021 Embedded Analytics Technology Value Matrix Identifies Domo, Infor, Looker,…

“The number of unmanaged systems on the Internet is soaring, and this ever-expanding risk surface is already a target. Unfortunately, most defenders lack the information they need about IoT and OT systems in their environment,” said Greg Bell, co-founder and chief strategy officer for Corelight. “Our integration combines best-in-class network evidence from Corelight, with the advanced vulnerability management, threat intelligence and detection and response capabilities of Microsoft Defender for IoT. The result is more efficient incident response, and deeper insight into IoT footprint, behavior, and risk.”

Corelight’s open NDR solution provides full network coverage of on-premise, cloud, and hybrid environments to help security operations teams using Defender for IoT detect and respond to the most challenging attacks. As an open platform, Defender for IoT can use network signal from Corelight sensors for asset discovery, inventory, risk assessment, detection, and mitigation.

Related Posts
1 of 40,668

Get In-Depth Insights of AI : Loopback Analytics Partners with Baptist Health South Florida on Specialty Pharmacy Initiatives to…

“Corelight is leveraging our open platform to share data to further enrich Microsoft Defender for IoT,” said Nir Giller, Microsoft Defender for IoT group manager. “Customers who have deployed Corelight can secure their entire IoT and OT environments with Microsoft 365 Defender and Defender for IoT within minutes while adding more detections based on encrypted traffic analysis and complementing Microsoft’s MITRE ATT&CK coverage.”

Additional benefits from Corelight’s solution include:

  • Network detection and response (NDR) coverage for every device on the network: Understand and manage risk across the entire IoT and OT landscape including high-value assets, managed and unmanaged endpoints, IoT devices, and cloud environments.
  • Single platform for NDR: Corelight provides everything security operations teams need for detection and response, built on open standards including Zeek® for telemetry, Suricata for alerts, and Smart PCAP for packets.
  • Faster answers for analysts and hunters: Rich, structured network data from 35+ protocols, 400+ data fields captured in real time provides additional context for alerts, accelerating incident response and dramatically expanding threat hunting capabilities.
  • Integration with existing SOC toolsets: Correlate rich network telemetry with threat intelligence feeds for sending to multiple destinations simultaneously, including Microsoft Sentinel, Splunk, and other analytic tools.
  • Deeper insights: Unique insights to hunt for attackers without compute-intensive practices that compromise privacy, find command-and-control (C2) activity with more than 50 unique insights that cover both known C2 toolkits and MITRE ATT&CK C2 techniques, and more.

Browse The Complete News About AI : 3Cloud Acquires Leading Data and Analytics Consulting Firm CCG Analytics

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.