March 20, 2017 By Security Intelligence Staff 3 min read

The 200-Day Gap

With an estimated 200-plus days between the initiation and discovery of attacks, organizations are seeking solutions to disrupt the attack life cycle and expedite defense. Many security professionals are scratching their heads wondering, “What is the origin of the 200-day gap?” and “What technologies and techniques are required to disrupt the attack life cycle?”

Despite billions of dollars invested, the security industry has struggled to identify a simple solution to address a key origin of the gap: access to information about the targeted victim, the endpoint and the skilled resources to investigate. Endpoint context is the No. 1 success criterion for rapidly validating and responding to threats. This includes factors such as:

  • Knowledge of the operating system, applications, versions and patch levels;
  • The geography (via time zone);
  • Translation of network address translation (NAT) addresses;
  • Access to ingress/egress payloads;
  • The ability to inspect encrypted communications and payloads;
  • An understanding of what occurred on the endpoint after a suspected attack; and
  • The time and skill to evaluate the information above in your specific environment.

In the absence of endpoint context, security analysts are blind and must deal with significant manual labor, high false positives and lengthy collaboration across IT resources. The lack of immediate and accurate access to context results is the gap.

This issue affects everyone in security and is reaching epidemic proportions. Regardless of your security controls, one aspect is universally true: The attack is destined for the endpoint.

Closing the Gap

While Carbon Black is the leader in next-generation endpoint security, our products are initiating an evolution in security operations center (SOC) process and procedure. Carbon Black solutions provide not only an endpoint defense capable of blocking the most sophisticated attacks, but also rapid access to endpoint context and click-to-research functionality on pristine, unadulterated data.

Due to continuous and centralized endpoint recording, analysts can close the gap by researching attacks as they occur, before attackers have an opportunity to erase their tracks. SIEM, SOC and MSSP analysts no longer have to wait for answers; they can take action with some of these questions:

  • What was blocked and what wasn’t?
  • What is the OS, version and patch level?
  • Is this platform vulnerable to the attack?
  • What files were downloaded?
  • Is the file known malicious?
  • What gap in the environment allowed the attack to happen, and how do we plug that gap to save my security team from having to respond to similar events in the future?
  • What processes and modifications were made when a file was executed?
  • How many machines are affected and which are likely next targets?
  • Do I need to isolate infected hosts from the rest of the network?
  • How severe was this attack and how do I prevent it from happening again in the future?

Igniting an Evolution in SOC Process and Procedure

Born is a new era of Tier 2 response: the ability to immediately research threats with unparalleled access to the binaries, processes, industry-grade intelligence and workflow tooling. Carbon Black is extending its position in endpoint security, integrating deeply with SOC process and procedure and developing a strategy to deeply integrate with SIEM platforms, the epicenter of today’s advanced SOCs.

Every second counts when disrupting and defending against advanced attackers. Time is money as security leaders and managed security service providers (MSSPs) fight to achieve enterprise security, profitability and return on investment. As a result, Carbon Black is extending its leadership position in endpoint detection and response (EDR) as an evolutionary force within today’s SOC, and focusing on the eradication of the gap through endpoint context and the ability for rapid response.

IBM also has several service offerings that support customers by addressing this critical need. In addition to monitoring services, IBM announced a managed detection and response offering in 2016. This tool leverages Carbon Black Response and an integration with managed SIEM through QRadar to conduct proactive threat hunting.

Now, IBM is announcing Endpoint Managed Security (EMS). EMS is a next-gen antivirus endpoint defense service leveraging Carbon Black’s innovative new endpoint prevention technology, Carbon Black Defense.

Learn More at IBM InterConnect 2017

You can learn more about these exciting new offerings at InterConnect. Stop by the Carbon Black booth (No. 845) or the IBM Security booth (No. 830), or attend one of these sessions:

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today