{"id":4237,"date":"2019-09-05T05:46:24","date_gmt":"2019-09-05T05:46:24","guid":{"rendered":"https:\/\/209.235.70.100\/?p=4237"},"modified":"2020-01-04T05:46:46","modified_gmt":"2020-01-04T05:46:46","slug":"meeting-the-security-challenges-of-the-future-using-managed-detection-and-response","status":"publish","type":"post","link":"https:\/\/www.navisite.com\/blog\/meeting-the-security-challenges-of-the-future-using-managed-detection-and-response\/","title":{"rendered":"Meeting the Security Challenges of the Future using Managed Detection and Response"},"content":{"rendered":"\n

The modern hybrid network is increasingly complex and difficult to manage. Technology is evolving faster than your employees can upskill. And some skills are in such short supply that sourcing suitably qualified candidates is incredibly difficult \u2013 and expensive.<\/p>\n\n\n\n

With so many potential attack surfaces, maintaining security perimeters and systems integrity is incredibly difficult. This is where Managed Detection and Response can assist.<\/p>\n\n\n\n

What is \u201cManaged Detection and Response\u201d?<\/strong><\/p>\n\n\n\n

Also known as MDR, Managed Detection and Response is designed to help reduce the administrative overheads of network security without compromising the level of protection applied. At the most basic level, MDR is an outsourced security service that takes cares of everything for you; proactive monitoring for potential security issues, maintenance to fix any identified issues and response in the event of a successful system breach.<\/p>\n\n\n\n

Importantly, a proper MDR service is completely hands-off. Your partner is responsible for providing the people, skills and expertise, allowing your in-house team to focus on strategic projects that grow the business.<\/p>\n\n\n\n

An MDR service is also capable of coping with the modern hybrid cloud infrastructure model adopted by so many organizations. In order to be fully comprehensive, MDR uses a number of techniques and tools.<\/p>\n\n\n\n

Signatures<\/em><\/strong><\/p>\n\n\n\n

The most basic of all defense techniques, signatures are known \u201cmarkers\u201d that identify a specific security attack. The signatures used by your antivirus endpoint protection is one such example of this technique being used; apps are compared against a list of known<\/em>behaviors (the signatures) and any matching activities are terminated and blocked automatically.<\/p>\n\n\n\n

Signatures are also employed by stateful firewalls and other protective measures.<\/p>\n\n\n\n

Advanced proactive monitoring<\/em><\/strong><\/p>\n\n\n\n

Signatures are useful, but they can only be used in a reactive context \u2013 these systems can only work with a known list of security risks. There will always be a lag between a new security exploit being developed, and a fix being developed, and it is during this window that your systems are most at risk.<\/p>\n\n\n\n

Advanced proactive monitoring brings more intelligence to the task of seeking security issues. Agents installed at key points on the network monitor and analyze application and traffic activity to create a baseline of normal behaviors. Any future activity that deviates from this norm is blocked \u2013 or flagged for further investigation. The system uses machine learning to learn \u2013 and act \u2013 proactively in the interests of network security.<\/p>\n\n\n\n

Forensic investigation tools<\/em><\/strong><\/p>\n\n\n\n

Dealing with the aftermath of a security incident is more than simply patching systems and recovering data from backup. There is a very real risk that a crime has been committed and evidence will need to be collected and preserved.<\/p>\n\n\n\n

An MDR provider has access to the forensic tools required to collect this evidence. You will need proof of the damage caused \u2013 and your efforts to mitigate it for:<\/p>\n\n\n\n