![]()
|
By Chris Johnston
CEO, Bulletproof
Read time: 14 minutes
|
Through decades of experience in providing security solutions to customers, Bulletproof security experts have come to recognize a critical truth: the best-of-breed point solution model to secure enterprise organizations is no longer the best approach to protection.
Arming your enterprise with the “best” security point products does not ensure complete coverage in terms of security posture. In many cases, it results in coverage gaps between products. This approach can also create unnecessary overlap, leading to confusion and inconsistency in applying policies and responding to threats.
What we have learned–and lived–is that the true “best” security posture is one that tightly integrates to provide a complete, holistic picture of the organization, with no overlap or conflict in the process for investigation of or response to incidents. While other solutions can provide a “single pane of glass” for investigation, what sets this new best-of-platform model apart is the speed of incidence-to-response that automation provides.
The greatest financial impact to an organization happens in the period of time between incident detection and containment. The larger this window is, the more detrimental and costly the attack to your business. The best-of-platform approach can reduce this period of time to minutes with automated response. It provides cross-correlation between components, and automatic remediation and mitigation of security incidents.
This creates a much more effective approach to security—which, in a nutshell, demonstrates that the whole of the solution is greater than the sum of its parts. The value of the fully integrated solution with automated response is that it greatly reduces the risk that organizations face from missing a signal. It also reduces time lost to hunting through disjointed management consoles caused by siloed “best-of” products. This great reduction in risk and increase in response speed is the ROI.
Intelligent technology is well-suited to take on more repetitive tasks such as noise monitoring and low-level event handling. No one wants to miss threats by ignoring things, but human time wasted on chasing dead ends leads to longer response time for actual incidents. Automation helps correlate, consolidate, and analyze a high volume of alerts, enabling your human analysts to spend their time on investigation and remediation of complex issues. Automated response across the entire platform–which is the only chance for successful mitigation of a complex human-led breach or attack–can only be achieved by a platform that provides complete end-to-end coverage, from endpoint to infrastructure, identity to cloud.
This cannot be accomplished natively within a multi-vendor EDR/SIEM offering. Every additional static integration point in a multi-vendor offering adds complexity, risk, overhead, confusion, and delay in response time.
Investigation capabilities are also vastly improved in the best-of-platform model. We can investigate through a single management console rather than through various vendor consoles for different products. With this capability, we can investigate a single collection of evidence rather than individual components. This significantly decreases the time required to investigate and respond, leaving much less time for the “bad guys” to do damage.
The threat landscape has evolved to a point where, unfortunately, the best-of-breed model is now creating a false sense of security. It creates gaps. It creates confusion. It creates additional overhead. In today’s threat landscape, with a continuous increase in the volume and complexity of attacks, the ability to streamline investigation and response across your entire platform is the only viable option if you want to properly protect your business.
At Bulletproof, we fulfill the promise of best-of-platform protection with the Microsoft Security platform. In our experience, it offers unmatched integration and automation.
The security industry is inundated with acronyms, and the latest to hit the market is XDR, or Extended Detection and Response. It is defined by Gartner as “a SaaS-based, vendor-specific security threat detection and incident response tool that natively integrates multiple security products into a cohesive security operations system that unifies all licensed components.” This industry shift toward a platform approach is in recognition of the gaps that exist in the legacy best-of-breed model, particularly as it relates to response capabilities.
Microsoft has been a leader in this space well before the acronym was coined, and recently rebranded their security suite of products under the Microsoft Defender brand to better reflect the pre-existing integration across its platform. Microsoft Defender includes coverage across all areas of a customer's computing environment, including:
The time differential between detection and remediation in the best-of-breed vs best-of-platform scenarios can make or break your organization. Response times under the best-of-breed model can be hours at best, but can stretch into multiple days or even weeks. The cost of breach continues to rise, and studies show that automated response capabilities can cut this cost in half.
The bottom line from what we’ve seen in the wild? Automated response is the best defense against complex human-operated attacks.
Microsoft Defender for Endpoint is the only solution that provides AI-based automated response natively, right out of the box, which can automatically investigate, evaluate, and respond to threats. The ability to respond to threats from the Defender for Endpoint portal, whether manual or automatic, is a key differentiator from other solutions. The deep integration provides visibility and control beyond what other solutions can offer.
An example of automated remediations that we have seen is a scenario in which a workstation is used to browse a website and it downloads a file which turns out to be malicious when it is executed. Defender for Endpoint can detect this and alert the Defender for EndPoint portal, where Microsoft Sentinel, based on policies in place, can automatically instruct the workstation to isolate itself from the rest of the network until it can be investigated thoroughly. This is just one example of how automated remediations can be used to shorten the time between detection and response of an issue.
The alternative to this is the legacy scenario, whereby a security officer or other IT personnel are alerted of a potential incident, time is spent investigating the received alert, a decision is finally made to investigate the workstation more thoroughly, and someone either manually removes the workstation from the network, or makes changes to a network switch or other architecture to isolate the workstation. This takes time—time that could allow something malicious on a workstation to traverse laterally throughout the network and affect multiple devices. This is, unfortunately, the scenario that we are often faced with when using best-of-breed solutions that do not have built-in, automated response mechanisms.
The bigger issue, however, is if credentials were captured before the workstation was isolated. If there is no integration between security solutions, even though the machine has been isolated, the identities on the machine have not. This means the attacker can simply jump directly into the cloud, furthering the attack.
Defender for Endpoint is also a built-in component of Windows 10, with complete integration and visibility into the Windows OS. No other EDR/XDR can provide the same level of visibility and control on the workstation. With this built-in approach there are no agents to deploy and manage. The features already exist in the OS, which also makes them harder for bad actors to bypass or disable.
Further, Cloud Access Security Broker (CASB)-like functionality is built into Defender for Endpoint, which allows automatic protections such as blocking a workstation from accessing a malicious website that has been identified by Microsoft’s Threat Intelligence. It also integrates tightly with Microsoft’s CASB, Microsoft Defender for Cloud Apps, which provides additional control and visibility into a workstation/user’s use of other cloud services—even non-Microsoft services like Dropbox, SalesForce, etc.
This integration of Defender for Endpoint with Microsoft Defender for Cloud Apps also allows organizations to sanction or disallow the use of certain cloud SaaS apps or services for groups of users or for all users. This can’t be done with security products that aren’t integrated.
Other out-of-the-box automated remediation/mitigation techniques that can be deployed on a workstation through the use of Defender for Endpoint include:
It is no surprise that email is still the primary attack mechanism for malicious software and bad actors. Protections for email environments are paramount and considered table-stakes for most organizations’ security programs. There are many competing solutions in the market that can help reduce the number of phishing emails, malicious attachments, files, and links that your users come into contact with, and many of them do a respectable job of detecting and preventing these threats from reaching your user base.
Microsoft Defender for Office 365 P2 is an extremely capable mechanism that Microsoft provides to help in this regard, and it is an integral component of the Microsoft 365 Security suite. But, Microsoft Defender for Office 365 P2 takes its coverage further than its competitors. Not only does it protect email, but it provides protection for other productivity applications, such as OneDrive, SharePoint, and Teams. Microsoft Defender for Office 365 P2 will detect when malicious files (or even web links) are pasted to these applications, removing them before users can innocently click on them and find themselves in trouble. This closes a gap that other products suffer from.
Competitor solutions focus exclusively on email, and some of them only detect malicious items as they pass through the protection gate–they can’t reach into your users’ mailboxes and remove links that become weaponized AFTER the email was delivered.
Microsoft Defender for Office 365 P2 is very tightly integrated with the rest of the Microsoft security stack and provides automated response mechanisms to reduce the time between incident detection and response. Microsoft Defender for Office 365 provides responses to automated investigations that can include the following actions, right out of the box:
There are other capable email hygiene solutions out there, but they don’t protect key areas that Microsoft Defender for Office 365 P2 does–namely, Teams, SharePoint, and OneDrive. This becomes more and more important as your organization scales out use of these services, invites external users into your Teams and SharePoint environments, and allows access to all of these environments from devices that you do not directly manage.
Traditional SIEM solutions, which lack integration and deployment of the complete Microsoft E5 Security stack, do not allow the same level of security monitoring and incident response. Legacy SIEM solutions can be appropriate for legacy environments, but are not suitable for modern workplaces with modern productivity applications and services.
A modern environment requires a modern security solution, with enhanced investigation and response capabilities. The value of the complete solution with automated response far exceeds what individual “best-of” products can provide for an organization on their own. This reduction in risk is the ROI of the best-of-platform model.
On-Demand Webinar | Chris Simm, Director of Cloud Consulting
Behind every good security product will lie gaps and challenges from configuration to maintenance. Learn the economics of a breach, where to find the most common security blind spots, and how automation can help you keep up with a rapidly changing IT landscape.
|
|
We integrate productivity and security into every solution we develop.
We deliver value, protection, and peace-of-mind that other cloud managed service providers can't.
We're here to help solve your complex IT and security problems. Get in touch using this form and we'll connect you with a Bulletproof expert.