Mandiant expands XDR platform

Mandiant expands XDR platform

Share post

The new XDR solution, based on threat intelligence, helps companies to defend their digital assets, their supply chains and their brand against persistent cyber attacks. It also extends Mandiant Advantage's cross-vendor XDR platform.

Mandiant, the leader in dynamic cyber defense and incident response, launches a new digital risk protection solution. This leverages Mandiant Advantage's cross-vendor XDR platform to provide a threat-intelligence-driven view of an organization's global attack surface and business-related activities across the deep web and dark web. The solution combines multiple modules of Mandiant Advantage and enables security leaders to proactively mitigate threats before they disrupt business operations. As part of the launch, the new Digital Threat Monitoring module is also available immediately as part of Mandiant Advantage. The module is an important part of the solution to protect customers from digital risks.

Client Digital Risk Protection

Gaining visibility into external malicious activity and compromised assets is a major challenge for most public and private sector organizations. Even with this insight, organizations can remain vulnerable to cyberattacks if they don't have the right resources and competencies to effectively monitor, investigate, and control security alerts.

Mandiant's digital risk protection solution gives organizations visibility into what's happening outside their network. These include high-risk attack vectors in the externally accessible infrastructure, malicious actions on the deep web and dark web, and campaigns on the open web. The solution is composed of Mandiant Advantage Digital Threat Monitoring, Mandiant Advantage Attack Surface Management and Mandiant Advantage Threat Intelligence. It is available both as a stand-alone, self-managed solution and as a comprehensive service.

Mandiant's solution has the following advantages

  • Visibility into External Attack Surfaces and Targets: By analyzing your own attack surface and monitoring deep web and dark web activity, you can identify vulnerabilities and gain insight into risk factors affecting the extended enterprise, including supply chains.
  • Threat Analysis and Risk Identification: Proactively protect against impending threats by understanding which hacker groups are targeting the organization, what they aim for (financial gain, espionage, sabotage…) and how they intend to attack.
  • Threat Intelligence-Based Prioritization: By leveraging threat intelligence from Mandiant's frontline cyber investigations, the expertise and in-depth analysis of seasoned specialists, clients can confidently prioritize necessary mitigations and investments.

Introducing Mandiant Advantage Digital Threat Monitoring

The new Digital Threat Monitoring module within Mandiant Advantage continuously monitors the internet - including the deep web and dark web, blogs, black markets, social media, paste sites and more. This uncovers attacker discussions about a company's brand, individual executives, key projects, technology assets, and third-party vendors and partners. Customers benefit from early notification of an imminent attack or an existing, yet undiscovered data or access data leak. This enables a faster reaction and the taking of targeted countermeasures.

Digital Threat Monitoring is powered by Mandiant's threat intelligence and is an integral part of the digital risk protection solution. Additionally, like most of Mandiant's offerings, Digital Threat Monitoring can be delivered both as a standalone product and as a managed service, enabling organizations of any size and cyber maturity level to face any threat.

More at Mandiant.com

 


About Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response. With decades of experience on the cyber frontline, Mandiant helps organizations confidently and proactively defend against cyber threats and respond to attacks. Mandiant is now part of Google Cloud.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more