Dell SecureWorks has launched a new suite of services focused on helping organizations defend against advanced persistent threats (APTs).
Dubbed Targeted Threat Intelligence Services, the aim is to enable organizations to be proactive in identifying, understanding and protecting against cyber threats targeting their key infrastructure, as well as critical data and executives, according to the company. The suite has three components: Targeted Threat Surveillance, Enterprise Brand Surveillance and the Executive Threat Intelligence.
According to the company, the Targeted Threat Surveillance service combines the research of Dell SecureWorks’ Counter Threat Unit (CTU) research team, its global security threat visibility and the Threat Intelligence link analysis platform to identify threat indicators related to an organization’s infrastructure. If a correlation is found between something in a customer’s infrastructure and these threat indicators, the CTU research team can provide customers with actionable intelligence so they can improve their defenses, the firm said.
“In Advanced Persistent Threat/Targeted attacks, hackers create custom attacks and infrastructure to target one or a handful of organizations,” said Jon Ramsey, chief technology officer, Dell SecureWorks, in a statement. “However, even with APT attacks, the attackers do use common tactics such as spear phishing and other social engineering ploys. With our Targeted Threat Intelligence services, we are looking to provide insight into the specific attacks, infrastructure and tactics, as it relates to the organizations being targeted.”
The Enterprise Brand Surveillance service provides real-time monitoring of information outlets to identify threat actors targeting an organization to enable customers to quickly prepare countermeasures to protect their infrastructure, assets and business’ brand reputation, and the final piece of the puzzle – the Executive Threat Surveillance service – can monitor and assess information security risks to executives and personnel, including posts on social networking sites.
“Having more context into the cyber threats targeting your organization, as well as the indicators of these threats, enables your security team to implement customized and robust security controls and defenses, while helping prepare your incident response and forensic teams for any possible scenario,” Ramsey said.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
