Targeted Cyber Threat Intelligence Services Launched By Dell SecureWorks To Help Organizations Identify And Defend Against Targeted Cyber Attacks
Dell SecureWorks, an industry leader in information security services,
has launched a new suite of “
Threat Intelligence Services” designed to help organizations be
proactive in identifying,...
Dell SecureWorks, an industry leader in information security services, has launched a new suite of “ Targeted Threat Intelligence Services” designed to help organizations be proactive in identifying, understanding and defending against cyber threats targeting their key infrastructure, critical data and executives. The services include three offerings: Targeted Threat Surveillance, Enterprise Brand Surveillance and Executive Threat Surveillance and complement Dell SecureWorks’ current Global Threat Intelligence offering. The “Targeted Threat Surveillance” service combines the research expertise of Dell SecureWorks’ renowned Counter Threat Unit (CTU) research team, its unique global security threat visibility, and a state-of-the-art Threat Intelligence link analysis platform. Using network and host identifiers from an organization, such as key IP addresses and domain names, the CTU research team can proactively monitor Dell SecureWorks’ high-value proprietary, private and public information sources to identify threat indicators related to an organization’s infrastructure. Because organized cybercriminals and Advanced Persistent Threat (APT) actors operate in a stealthy manner, the key way of tracking them is through the digital traces they leave behind. When an initial correlation is found between a customer’s infrastructure and these digital traces, the CTU research team then uses a combination of their world-class expertise, advanced threat intelligence analytics and an analysis of their broad threat telemetry to identify and assess related indicators and provide further link analysis and context in order to assess the true threat the indicator may represent. As a result, customers are provided with actionable threat intelligence. For example, the CTU research team can identify relationships between specific malware samples and an organization’s infrastructure and provide security intelligence about the malware’s operational capability, relationships to attack infrastructure known to be used by the malware, targeting telemetry, and threat indicators which can be used to detect, protect and respond. By proactively analyzing an organization’s network and host identifiers against Dell SecureWorks’ continuous streams of threat data, the CTU research team’s goal is to provide well-researched, relevant and actionable threat intelligence to help organizations improve identifying and understanding the real-world threats to their critical assets so as to improve protection and response.