Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

11/1/2017
10:45 AM
Simon Marshall
Simon Marshall
Simon Marshall
50%
50%

Demisto Brings Bots to Security Noise

A Security Now company profile of security automation firm Demisto.

Security teams are over-stretched. It's no secret. The diversity and explosion in threats versus the skills shortage are making everyone sweat. The noise from threat warnings is increasing, prioritization is a struggle and sometimes knowledge and experience get lost along the way.

In the early 2010s, Slavik Markovich was VP and CTO of database security at McAfee. "I was happy with my products, but I saw how customers were trying to handle the warnings coming in, and they were being destroyed by number of alerts," he tells Security Now. Markovich graduated from Technion, Israel's institute of technology in Haifa, and also undertook national service in the military.

"I got two good things in the army," he says, "One is a great education about technology, and how large systems work, the other is responsibility at an early age and an understanding of command structure." It was time for some practical problem solving.

Along with Rishi Bhargava, a VP of product management at McAfee, in mid-2015 he founded Demisto, a Bay Area firm funded through two rounds totaling $26 million, and focused on security automation and orchestration. At least, that's what the label says on the box.

"The problem was not that we were hearing that people wanted automation or orchestration, but that their biggest challenge was all the noise from a lot of threat data," says Bhargava, Demisto co-founder and head of marketing. Companies trying to keep pace with threats were spending a lot of budget on security systems and then faced the dilemma of how to staff them. Even after having open recs for months, firms were unable to find the right people, or enough people.

"It's a meta-problem: people didn't realize at the time that by buying more security tools they would create a problem for themselves, but they felt they had to buy the tools because they're being attacked from all sides," explains Bhargava.

In response, Bhargava and Markovich decided to take a leaf out of the DevOps book, using the concept of constant collaboration and development as the inspiration for their solution.

Co-founder and CEO Markovich explains, "We knew that DevOps folks are very keyboard oriented, command line-oriented, and it sounded natural to us, faster and more interesting to have a bot to chat to rather than pointing and clicking" when security problem solving. "When you point and click, how is that knowledge captured? It's not."

Thus DBot was born. Central to the security orchestration process, so-called DBot provides a level of automation that frees limited team analyst experience to focus on the worthiest issue of the moment -– the decision-making. It interacts with analysts seeking information, and pulls other analysts into virtual war rooms where human experience solves the problem.

The bot acts as an assistant, documenting and indexing the whole process. Theoretically, the organization becomes intellectually stronger against future threat scenarios. Also, its knowledge builds, and human expertise is permanently documented.

"One of our customers calls this the bus factor," says Bhargava. "If an analyst works gathering knowledge and experience for years, but then gets hit by a bus, all of that is captured and not lost."

According to Demisto, DBot not only tracks information, but it educates itself as it goes along, employing machine learning that improves its experience base. The difference with this versus regular machine learning machine is that it is not just text or data-based learning, it also learns from the actions that the security analysts take.

"What we're trying to do is replicate the real life of an analyst in a SOC, so it's not only automation, or chat or case management, it's everything together," explains Markovich.

Silicon Valley collaboration giant Slack is one of Demisto's funders and partners. The security firm's next goal is to extend the concept of collaborative security out into a number of other enterprise applications, using the collaborative type of framework employed by Slack. Demisto also works directly with Slack using a free open source tool that aims to stop the sharing of malicious content on the platform.

This is the first in an occasional series of company profiles that explain how young companies are providing new approaches to security threats.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.