Cynet to introduce integrated XDR, MDR and response automation

Cynet announced the future of extended detection and response with the launch of Cynet 360 V4.0. The new generation autonomous breach prevention platform now features XDR, 24/7 Managed Detection & Response (MDR) and full Response Automation, improving cyber threat detection accuracy while reducing the complexity and overhead required for comprehensive defense and mitigation of sophisticated and subversive cyber-attacks.

Cybersecurity professionals now deploy multiple prevention and detection technologies to defend an endless variety of vulnerabilities and attacks to endpoints, networks, users and data. While these tools generally do a fine job preventing and detecting the vast majority of cyber-attacks, Cynet says they continue to miss the edge cases – the difficult to identify attacks that slip through the cracks between these point solutions. Visibility across the environment and understanding the context of security data and alerts is required to solve this complex problem.

According to Gartner, “Extended detection and response (XDR) solutions are emerging that automatically collect and correlate data from multiple security products to improve threat detection and provide an incident response capability. For example, an attack that caused alerts on email, endpoint and network can be combined into a single incident. The primary goals of an XDR solution are to increase detection accuracy and improve security operations efficiency and productivity.”

Cynet 360 V4.0 aims to set new standards in the cybersecurity space. Advanced capabilities include:

  • Full threat visibility: Cynet 360 V4.0 provides complete visibility across the entire environment. The detection power achieved by natively combining signals and data from multiple sources simply cannot be matched by siloed, point protection solutions. Even the most subversive attacks are fully exposed with pinpoint accuracy by Cynet.
  • Complete cyber threat prevention and detection: Cynet 360 V4.0 provides multiple, integrated prevention technologies to block standard and advanced attacks across the environment. Deception technology is also built-in to entice cybercriminals that have penetrated the network into exposing themselves before they do real damage.
  • Incident orientation: Centralising the signals from multiple detection sources allows Cynet 360 V4.0 to group related alerts and data into incidents. Incidents include all related alerts and indicators of compromise (IOCs) related to an attack and fully automates root cause analysis, threat impact determination and remediation actions.
  • Response automation: Cynet 360 V4.0 provides fully automated response tools for cross-environment investigation and remediation. Investigations are fully automated – first determining the root cause and then analysing the full breadth and impact of the threat.

New to Cynet 360 is the unique and insightful Incident Engine(1), an automated response capability that produces a visual map of an entire incident investigation and response. In as little as five minutes, the advanced tool automatically performs a full incident response workflow, including root cause analysis, full threat impact determination and all necessary remediation actions – significantly reducing the mean total time to contain and eliminate real threats.

Complementing the Cynet 360 V4.0 offering is the addition of the CyOps 24×7 detection and response services team. CyOps is a team of world-class cybersecurity experts that continuously monitors all Cynet customer environments 24/7 to ensure any attacks are uncovered, provides ad-hoc threat investigations and forensic analysis, and guides users through any necessary remediation steps.

“Because cybercriminals find ways to circumvent the cocktail of security solutions in place by most organisations, we are answering the call to strengthen and simplify the process,” said Eyal Gruner, CEO and co-founder of Cynet. “Cynet 360 V4.0 provides the security operations centre (SOC) with a complete view of cyber threats to applications, endpoints, system networks and overall IT infrastructure where automated processes are executed to detect, analyse, hunt, and thoroughly resolve threats.”

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Carson City upgrades to Iteris’ advanced Vantage Apex sensors

Posted on: April 26, 2024

Iteris has announced that Carson City, Nevada has chosen to upgrade the city’s intersection detection sensors to Iteris’ Vantage Apex hybrid sensors.

Read more

Make the Intelligent Choice: Embed X103 in Smart City Outdoor Devices

Posted on: April 25, 2024

The adage “less is more” is the current state of digital transformation, starting with existing technology that has already proven successful – and then further adapting and streamlining. The “smart

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more