Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

9/18/2017
02:47 PM
Simon Marshall
Simon Marshall
Simon Marshall
50%
50%

Vigilance Brings Machines & Humans Together to Defeat Threats

Vigilance, from SentinelOne, ties the strengths of humans and machines together in a threat-resolution system.

People and machines together can be greater than the sum of their parts, and this is exemplified by SentinelOne, a Silicon Valley-based firm that secures endpoints, datacenters and the cloud.

Vigilance is the name of the game, and also happens to be the name of SentinelOne's new service, based on its existing endpoint security platform, which augments the power of computer threat detection with a team of human analysts and researchers based in Mountain View and Tel Aviv.

The platform detects the threats. The humans examine, discuss and then respond to them. Simple.

According to SentinelOne this is an optimal arrangement where detection, prioritization and responses are accelerated because there are more bodies and know-how on the job, apparently thereby reducing corporate risk. The Vigilance service provides the elasticity to call on additional eyeballs during a high threat period, or to provide more expertise in security analysis and research than might be found in a single enterprise team instance.

There's a strong reliance from the Vigilance team on the platform to provide primary threat information -- to be the eyes and ears -- and for the analysts and researchers to be the brains. "The service ingests threat information from the agent detection, and 80% to 90% of the analysts' tasks are based on that information," said Eran Ashkenazi, VP of services and field operations for SentinelOne.

Oddly enough, the more problems the SentinelOne platform needs to handle, the better. It learns how to handle unique incidents and then that knowledge is propagated to SentinelOne's entire customer base, theoretically lessening the impact a new threat can have and spreading the benefits. At the 50,000ft level, the platform's main role is to differentiate between false and true positives, and then hand off that information to the human team. But what happens if the humans then make mistakes?

"There are several safeguards, but in short if there is a doubt, issues will be escalated to a second tier of malware researchers or reverses, or we'll interact with the customer to learn more or get the actual file or payload," Ashkenazi told SecurityNow.


Want to learn more about the tech and business cases for deploying virtualized solutions in the cable network? Join us in Denver on October 18 for Light Reading's Virtualizing the Cable Architecture event – a free breakfast panel at SCTE/ISBE's Cable-Tec Expo featuring speakers from Comcast and Charter.

An interesting aspect of the service is the ability for enterprise security teams to bring online extra personnel when they're needed. In some cases, those companies may simply have underestimated how many members of a team are needed to handle threats. But also, the sheer number of tools out there can cause headaches too.

"There are simply too many solutions to manage, and an average security team needs to probably deal with dozens of different platforms and dashboards," said Ashkenazi. "[Plus] the endpoint was for many years considered to be something that just works, which we [now] know is not the case."

In the last five years, endpoint protection, and endpoint detection and response, platforms have become more resource-intensive as the range and number of attack vectors increases. Like bacteria on a petri dish, the threats multiply in number and diversity until the whole lab is crawling with infectious organisms. Yet the number of scientists and technicians remains the same.

In SentinelOne's lab, they're looking next to incorporate AI into the platform, once deep visibility capabilities have nee incorporated, proving more data into the Vigilance service, enabling proactive hunting capabilities, and making the security stance of the platform more proactive.

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...
CVE-2020-8247
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...