Advertisment

Mandiant to fasten operational use of its threat intelligence with SaaS offerings

Mandiant launches new SaaS offerings that utilize its most accurate and relevant intelligence to help cyber security teams prepare for and detect attacks

author-image
CIOL Bureau
New Update
Mandiant to fasten operational use of its threat intelligence with SaaS offerings

Mandiant, Inc., a cyber defense and response company has announced two new SaaS offerings – Active Breach & Intel Monitoring and Ransomware Defense Validation.

Advertisment

The new products bolster the multi-vendor Extended Detection and Response (XDR) capabilities of the Mandiant Advantage platform by accelerating operational use of Mandiant’s threat intelligence and validating whether an organization’s security controls could alert, contain, or block prevalent ransomware attacks.

These offerings are designed with organizations of all sizes in mind to improve their security effectiveness and confidence in their readiness to defend against cyberattacks. The two new offerings are expected to be generally available in January 2022.

“Organizations of all sizes are struggling to answer basic questions as ransomware attacks are on the rise and they’re working to determine if they’re prepared or have been breached,” Chris Key, chief product officer, Mandiant, said.

Advertisment

The two products they have come out with are,

Active Breach & Intel Monitoring

Active Breach & Intel Monitoring, powered by insights gained from Mandiant’s global incident response engagements and comprehensive threat intelligence research, is designed to identify the presence of relevant Indicators of Compromise (IOCs) within the organizations.

Advertisment

Ransomware Defense Validation

Ransomware Defense Validation tests organizations’ critical security controls against prevalent ransomware and informs security teams of capabilities that require immediate attention.

Threats have become more sophisticated, especially during the COVID-19 pandemic and are targeting organizations of all sizes and industries. As organizations invest in talent and technology to stop these potential threats, they require solutions that quickly identify targeted attacks and gaps in security informed by up-to-date, relevant threat intelligence.