These three integrations bring to life the Defender Lifecycle Model, a new approach to security that addresses the increasing speed, volume and polymorphic nature of cyber threats. The model is based on a foundational layer of pervasive visibility across the four key pillars of prevention, detection, prediction and containment that are essential in a modern cybersecurity infrastructure. The model leverages the GigaSECURE® Security Delivery Platform and enables the integration of machine learning, artificial intelligence (AI) and security workflow automation to shift control away from the attacker and back to the defender.
The industry notes business demand for cybersecurity solutions. According to Gartner, “By 2020, 60 percent of enterprise information security budgets will be allocated for rapid detection and response approaches, up from less than 20 percent in 2015.” 1
“Our new Splunk and Phantom solutions help customers better manage the threat environment by streamling the collection, analysis and reaction to suspicious data using the GigaSECURE® Security Delivery Platform across their cybersecurity infrastructure. This will help customers expand their use case options, and accelerate both their deployment timelines and the time-to-value,” said Ananda Rajagopal, vice president of products at Gigamon. “The integrated solutions speed threat identification and mitigation by automating what is often a time-consuming and complex manual process.”
Splunk Integration Capabilities Overview
For SecOps teams who are challenged with managing an overwhelming amount of data, incidents and potential threats, the new Splunk ® integrations from Gigamon deliver the visibility and control required to quickly and effectively identify critical incidents and threats and automatically mitigate them.
The Gigamon IPFIX Metadata Application for Splunk allows Splunk customers to ingest network metadata generated by the GigaSECURE Security Delivery Platform. The Gigamon Adaptive Response Application for Splunk enables security operations centre (SOC) teams to take automated actions on the GigaSECURE platform in response to threats detected in Splunk ES.
The solutions can be used for a variety of use cases including:
· The isolation of an infected host trying to resolve high-entropy domain names or block rogue DNS servers.
· The detection and mitigation of malware attacks such as the recent WannaCry ransomware cyberattack.
· The redirection of traffic to a recorder or a specific security tool chain for advanced analysis can be performed when usual network traffic activity is seen.
“Increasingly sophisticated threats cannot be eliminated with any single technology. There is no silver bullet for security,” said Haiyan Song, senior vice president and general manager of Security Markets at Splunk. “We created the Adaptive Response Initiative to help organisations more efficiently and flexibly combat advanced attacks with their existing security architectures. Members like Gigamon are key to the success of Adaptive Response. We look forward to working with them as the world embraces an analytics-driven approach to security.”
Phantom Integration Capabilities Overview
The Gigamon App for Phantom provides SecOps teams with automated and orchestrated security operations and case management. The application utilises REST APIs provided by the GigaSECURE Security Delivery Platform and enables Phantom users to trigger workflows or remediation actions on the GigaSECURE Security Delivery Platform in response to specific events.
Key benefits of the Gigamon App for Phantom include automating common security operations tasks through predefined playbooks, and orchestrating network threat detection and mitigation to reduce mean time to resolution.
“Gigamon provides an innovative, extensible, pervasive platform for visibility that integrates with Phantom to orchestrate and automate critical security operations tasks,” says Oliver Friedrichs, CEO and founder, Phantom. “Our integrated solutions allow SecOps teams to work smarter, respond faster and strengthen their network defense postures.”