F-Secure’s New Service Pits Man and Machine against Targeted Cyber AttacksF-Secure Rapid Detection Service combines decoy sensors, threat intelligence, and 24/7 monitoring by a team of cyber security experts to help companies fight cyber attacks.
If you aren’t seeing security incidents, you’re probably missing something. That’s the message from F-Secure as it launches a unique new intrusion detection and incident response service to uncover threats in the corporate network. The managed service combines the best of human and machine intelligence with a promise to notify companies within just 30 minutes of a breach detection.
The average data breach can take weeks, months or even years to detect. According to Gartner, the greatest area of unmet need is effective targeted attack and breach detection. Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization.* Many companies rely solely on a defensive perimeter to protect them, which is crucial but only one part of a holistic cyber security strategy. With advanced threat actors who perform highly targeted attacks on organizations, an attack attempt will eventually bypass security controls and succeed in penetrating the network. The ability to quickly detect intrusions and immediately respond to them is critical – but that’s not easy to come by.
“Companies are finding that on their own, they really struggle with intrusion detection and incident response,” says Pekka Usva, VP of Advanced Threat Protection at F-Secure. “They need to find a staff of cyber security experts, build monitoring infrastructure, and source good threat intelligence data. Setting up a proper in-house system is extremely difficult and expensive and takes years to do. That’s why a managed service makes great sense – it provides an immediate, tangible return on investment.”
Man & machine: The best of both
F-Secure Rapid Detection Service leverages the strengths of both human and machine intelligence to provide an all-in-one intrusion detection and response service that’s ready to go immediately. The service consists of three major components: Endpoint and Network Decoy sensors that collect data about events and activities; F-Secure’s threat intelligence and behavioral analytics, which analyze the data to identify anomalies; and the Rapid Detection Center, which is staffed 24/7 by a team of cyber security experts who identify and handle incidents. When a breach is detected, an expert will contact the customer within just 30 minutes with incident response and to offer optional onsite investigative services if needed.
“The human component is an important factor,” says Erka Koivunen, Cyber Security Advisor at F-Secure. “Attackers are human, so to detect them you can’t rely on machines alone. Our experts know how attackers think, the very tactics they use to hide their presence from standard means of detection. The human factor also eliminates false positives, which are an extreme waste of resources.”
Respond with actionable intelligence
Once a breach has been detected, Rapid Detection Service also provides actionable intelligence for the response phase. The customer’s security team will learn exactly how the breach happened, how to isolate it, and get advice on remediation. With quick detection, an accurate diagnosis and expert advice on remediation, companies can limit damage and get back to business as quickly as possible. Additionally, F-Secure provides optional onsite services for incident management and forensic investigations.
With the introduction of Rapid Detection Service, F-Secure further strengthens its status as the leading European cyber security company. Rapid Detection Service easily integrates with any existing ecosystem and provides an additional layer of security to enhance the organizational cyber security strategy.
And enhance it will, says Koivunen. “Any customer who joins us with this service is already better off in defending their systems than anyone else.”
*Source: Gartner Magic Quadrant for Security Information & Event Management, Kelly M. Kavanagh, Oliver Rochford, published 20 July 2015
Latest Press Releases
Social engineering is simple these days, and spam has re-surged as an attack vector.
Insecure IP cameras are yet another example of IoT devices that are not built to withstand the threat landscape of the internet.
With its unique web topology mapping feature, F-Secure Radar does what other vulnerability management tools won’t: It helps admins discover their full attack surface, internal and external.