Shields up: free risk assessment with Network Detection and Response

Shields up: free risk assessment with network detection and response

Share post

The invasion of Ukraine puts the cybersecurity community on high alert; ExtraHop uses AI-powered network intelligence to assess security controls and detect attack activity. ExtraHop encourages organizations to adopt the 'Shields Up Guidance' and offers a free risk assessment.

ExtraHop, the leading provider of cloud-native network detection and response, announces that it will offer a free Shields Up evaluation to interested and eligible companies. The Russian invasion of Ukraine has put the world on high alert for retaliatory cyberattacks. Government agencies around the world have issued cybersecurity guidelines to help them stay safe.

Check: Does the company implement security policies?

Risk assessment helps organizations adapt and effectively implement the policies of organizations such as CISA, ENISA, CERT-EU, ACSC and SingCERT. It does this through real-time insights into security vulnerabilities such as insecure protocols, vulnerable devices and cloud misconfigurations, as well as AI and behavior-based detection of attack patterns and lateral movement. With these insights, security teams can detect, investigate, and respond to malicious activity before it has a significant impact on organizations.

Legacy protocols are still widely used, even in sophisticated organizations. A recent ExtraHop survey found that 64% of organizations admit that half (or more) of their cybersecurity incidents stem from their own outdated IT security measures, while 68% still use SMBv1, the protocol used in major attacks like WannaCry and NotPetya was exploited. At the same time, attackers are actively evading detection by employing increasingly sophisticated attack tactics, including using encrypted protocols to obfuscate exploits of known but unpatched vulnerabilities, such as Log4Shell.

The Shields Up assessment enables companies to do the following

  • Uncover all ports and protocols used and identify insecure protocols and weak encryption,
  • Finding all internet-facing assets inside firewalls that accept external connections,
  • Identification of all cloud and SaaS services sending and receiving traffic,
  • Find instances of unpatched devices with known security vulnerabilities, including Spring4Shell and PrintNightmare. Interested companies are invited to register for the free risk assessment today.
More at Extrahop.com

 


About ExtraHop

ExtraHop is dedicated to helping businesses with security that cannot be undermined, outwitted or compromised. The dynamic cyber defense platform Reveal (x) 360 helps companies to identify complex threats and react to them - before they put the company at risk. We apply cloud-scale AI to petabytes of traffic per day and conduct line rate decryption and behavioral analysis for all infrastructures, workloads and data on the fly. With the complete transparency of ExtraHop, companies can quickly identify malicious behavior, hunt down advanced threats and reliably forensic investigate every incident.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more