Threats! What Threats?

We talk often about “threats” and “threat detection” in our marketing materials and in discussions with our customers. 

But my colleague, Steve Patton recently asked “why don’t we ever mention the types of threats we’re talking about?”

Well, that’s a great question, Steve !

Network Security for Threat Detection & Response

As a reminder, at Stamus Networks we are a provider of network-based threat detection and response solutions. The reason we focus on the network is that it holds the ground truth for an enterprise’s security posture and does not require complex endpoint agents in order to be effective.

Even as more organizations shift to cloud-based resources, encrypted transmission, and remote workforces, nearly all cyber threats generate communications that can be observed on the network. And in many BYOD environments and with the proliferation of IoT devices, you can’t rely on endpoint detection to uncover threats.

So, what threats are we talking about?

Users of our Stamus Security Platform (SSP) will be familiar with the list of threat coverage displayed on this SSP threat "coverage" screen:

StamusNDR-ThreatCoverage

This screen captures the key threat families we’re talking about.

And there are even more types of threats that can be detected by using our guided hunting interface to create a custom threat detection rule - which would appear on the above screen under “Custom Threats.”

In this article, I’d like to highlight a reasonably short list of 18.

Here's my short list:

Here's a short video I hope makes the point in 17 seconds.

HubSpot Video

 

In subsequent articles, we will describe what we mean by each of the above threat categories and explain what sorts of things we can uncover with the Stamus Security Platform.

Does this help, Steve?

So, next time my colleague Steve asks “why don’t we ever mention the types of threats we’re talking about?” I can thank him and point him to this blog.

If you’d like to get a live demonstration of the Stamus Security Platform or discuss how it might help you detect and respond to threats in your network, please click on the button below to request a demo.

Schedule a Demo of Stamus Security Platform

REQUEST A DEMO

Related posts

Detecting Attacks Against OpenSSL Vulnerabilities

This blog describes the steps Stamus Networks customers may take to determine if any of your...

Impact of OpenSSL CVE-2022-3602 and CVE-2022-3786 on SSP and SELKS Users

TL;DR

Stamus Networks uses OpenSSL in the Stamus Security Platform (SSP) as well as our open source

Threats? What Threats? Penetration Tests and Stamus Security Platform

This week in our threat detection blog we are mixing things up and discussing an important  Stamus...