Dubbed Targeted Threat Intelligence Services, the aim is to enable organizations to be proactive in identifying, understanding and protecting against cyber threats targeting their key infrastructure, as well as critical data and executives, according to the company. The suite has three components: Targeted Threat Surveillance, Enterprise Brand Surveillance and the Executive Threat Intelligence.
According to the company, the Targeted Threat Surveillance service combines the research of Dell SecureWorks’ Counter Threat Unit (CTU) research team, its global security threat visibility and the Threat Intelligence link analysis platform to identify threat indicators related to an organization’s infrastructure. If a correlation is found between something in a customer's infrastructure and these threat indicators, the CTU research team can provide customers with actionable intelligence so they can improve their defenses, the firm said.
“In Advanced Persistent Threat/Targeted attacks, hackers create custom attacks and infrastructure to target one or a handful of organizations," said Jon Ramsey, chief technology officer, Dell SecureWorks, in a statement. "However, even with APT attacks, the attackers do use common tactics such as spear phishing and other social engineering ploys. With our Targeted Threat Intelligence services, we are looking to provide insight into the specific attacks, infrastructure and tactics, as it relates to the organizations being targeted.”
The Enterprise Brand Surveillance service provides real-time monitoring of information outlets to identify threat actors targeting an organization to enable customers to quickly prepare countermeasures to protect their infrastructure, assets and business’ brand reputation, and the final piece of the puzzle – the Executive Threat Surveillance service – can monitor and assess information security risks to executives and personnel, including posts on social networking sites.
“Having more context into the cyber threats targeting your organization, as well as the indicators of these threats, enables your security team to implement customized and robust security controls and defenses, while helping prepare your incident response and forensic teams for any possible scenario,” Ramsey said.