Blog Spotlight

todayJuly 9, 2021

Cyber security + Software Supply Chain Cybersecurity Daniel West

Software Supply Chain Targeting – Who Will The APTs Target Next?

Introduction After I saw the buzz about Kaseya on July 2nd, I decided it was time to start writing a blog post about targeting the supply chain.  Software supply chain “attacks” aren’t new, however, they will become much more mainstream now that there has been extended media coverage of the SolarWinds incident. You may have noticed a similar [...]

Top Voted Blog Posts
Sorry, there is nothing for the moment.




MDR

The Ultimate Managed Detection Response Platform

DISCOVER MORE


Background
MDR Overview

How MDR Secures Your Organization

Obscurity Labs understands the complexities of organizational security operations and therefore provide our security services as a collaborative process.  We work closely with our customers to establish a strong foundation that enables us to mature their Security Operations Program.   Our team of talented security engineers and analysts provide white-glove managed security services that are customized to fit the unique needs of each of our customers.  Our customers build strong relationships with our team members and know exactly who to call for support during an issue or security incident.  Obscurity Labs collaborates closely with our customer’s IT and security teams to resolve incidents and mature the organization’s overall security posture.  By working closely with our customers and aligning our goals, we’re able to effectively lower MTTD & MTTR over time.  We also offer on-tap security consulting in the form of senior leaders, IT, and security personnel capable of supporting our client’s team at any level whenever needed.


Download brochure
Key Benefits

check Comprehensive organization security posture maturity

check Intelligence-driven analysis & triage via our curated collection of threat intel feeds directly integrated into our SOAR platform

check Deep visibility and measurement into your organization’s environment and security posture

check Stop sophisticated threat actors & deter future attacks

check Real-time threat detection to reduce Mean Time to Detect & Respond (MTTD & MTTR)

check Recommendations from our team of talented security engineers to improve your organizations overall environment and security postures


SOCaaS (SOC as a Service)

Fully Managed Protection From The Top Talent In the Industry.
Bet On Us To Win.

A fully integrated system provides live updates and complete security on any level of your network, from the internet connection to any connected device.




Identify

Identify

Identify Assets and Manage Cybersecurity Risk

Develop an organizational understanding to manage cybersecurity risk to people, processes, and technology.
  • chevron_right Asset Management - Our tooling will provide a in-depth looking glass into your environment.
  • chevron_right Vulnerability Management - Our service includes complimentary Vulnerability Management expertise and tooling.
  • chevron_right Risk Assessment - Every SOCaaS starts with a Risk Overview tailored to your business needs.
  • chevron_right Guided Recommendations - To support custom security controls our security team will work with you one-on-one to aid in down selection of tooling.
Protect

Protect

Protect Organizational Data and Information Systems

Implement critical processes to protect data and information systems from unauthorized access
  • chevron_right Identity Management, Authentication, & Access Control - Our services help to ensure that only authorized identities access resources within your environment.
  • chevron_right Cybersecurity Awareness & Training - We can provide tailored training resources to ensure that your users understand their cybersecurity roles and responsibilities.
  • chevron_right Data Security and Information Protection Processes & Procedures - We recommend and implement protection mechanisms to assure the confidentiality, integrity, and availability of data and information.
Detect

Detect

Detect and Prevent Intrusions

Detect anomalous activity and prevent potential impacts.
  • chevron_right Detect Anomalies & Events - One of the core components of MDR, is performing detection. This requires analysis of millions and sometimes billions of records generated by nodes. We have expert analysts using industry leading tools and platforms to monitor alerts and events within these network and system transactions.
  • chevron_right Perform Security Continuous Monitoring - Beyond just monitoring logs, we can also provide holistic Security Operation Center monitoring including EDR and vulnerability scanning. We provide this for IT and OT resources.
Respond

Respond

Respond to Threats

Be prepared to respond to incidents.
  • chevron_right Plan - We can help execute the response plan in the event that an event escalates to an incident.
  • chevron_right Communicate - We can help setup communicate channels and communicate with incident response stake holders.
  • chevron_right Analyze - We can assist in performs analysis, including forensics and malware analysis, of incident artifacts.
  • chevron_right Mitigate - We can help contain and mitigate the incident fully.


Key Capabilities

The Obscurity Labs Managed Detection and Response (MDR) service is driven by our integrations with cutting edge security products that include Security Incident and Event Management (SIEM) and Security Orchestration Automation and Response (SOAR) platforms.  These platforms enable our team of experts to develop custom threat hunt playbooks driven by your organization’s data, that automate security responses to incidents as they occur.  Our customized database of curated threat intelligence is enriched by our custom rules and threat intelligence and facilitate the continuous maturation of both our hunt playbooks, automated responses, and our customer’s security posture.


24x7 Threat Monitoring

We have top tier cybersecurity talent monitoring the security stack 24x7x365. When are alert queue is empty, we are tuning our sensors and updating our playbooks to stay ahead of the threat.


Fully Managed Security Architecture

We prefer efficiency so we can focus on finding the harder to detect activity. Automation allows us to do this.


Threat Analysis Tier 1, 2 & 3

Our personnel understand the threats targeting your sector. Obscurity Labs is tied into multiple sector-specific organizations and stays up-to-date on the latest threat actors and threat actor TTPs targeting a variety of verticals.



Managed Endpoint Security

Thanks to Managed Endpoint Security we are able to granularly control things like policy deployment down at a per-host level. This is extremely important for places like datacenters and OT networks where there are sensitive and/or legacy systems.



Customer Portal

We utilize a customer portal that is also regularly monitored by our analysts. This allows our customers to keep in direct contact with our analysts about activity within their environment. We can also be reached via more direct means as well!



Stream Data Processing

If the data source will inform the security analysis process we want to feed it up into a SIEM if we can so the analyst have as much data at their fingertips as needed to make informed decisions about an event. Stream data processing allows us to do this in an efficient manner.



Key Differentiators

Custom Deployment

Obscurity Labs’ MDR team of expert security engineers will tailor the deployment and integration to fit your organization’s unique needs. This includes working with existing on-prem SIEMs and EDRs or deploying our own Managed Cloud-Native SIEM and Endpoint Detection & Response (EDR) agents.


Proactive Threat Hunting

Our team of highly trained security engineers constantly perform both reactive and proactive threat hunting.  Proactive threat hunting enables our team to identify stealthy threat actor presence and/or activity that have circumvented existing security controls.



Cutting Edge MDR Platform

Obscurity utilizes a customized MDR platform that consists of curated threat intelligence data enriched by our custom defined rules and indicators of compromise (IOC).  Our platform enables us to perform:

  • Machine Learning / Behavioral Profiling
  • Adaptive Automated Security Responses
  • Proactive Threat Hunting
  • Alert Monitoring, Validation, & Escalation
  • Well-Known & Custom Product Integrations
  • Customer & Security Team Collaboration
  • Stream Data Processing

Access to ON-TAP Security Consulting

Obscurity Labs is staffed with IT and security professionals that are experienced across a broad spectrum of IT & security areas, including:

  • Cyber Security & Risk Analysis
  • Adversary/Threat Emulation
  • Vulnerability Management
  • Infrastructure Architecture, Design, & Implementation
  • Network Engineering, Design, & Implementation