Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
On September 23, 2020, the National Institute of Standards and Technology (NIST) released the first major update to Special Publication 800-53: Security and Privacy Controls for Information Systems and Organizations in more than seven years. This fifth significant revision included the addition of RA-10: Threat Hunting.
RA-10: Threat Hunting
Control:
Establish and maintain a cyber threat hunting capability to:
Search for indicators of compromise in organizational systems; and
Detect, track, and disrupt threats that evade existing controls; and
Employ the threat hunting capability [Assignment: organization-defined frequency].
Discussion: Threat hunting is an active means of cyber defense in contrast to the traditional protection measures such as firewalls, intrusion detection and prevention systems, quarantining malicious code in sandboxes, and Security Information and Event Management technologies and systems. Cyber threat hunting involves proactively searching organizational systems, networks, and infrastructure for advanced threats. The objective is to track and disrupt cyber adversaries as early as possible in the attack sequence and to measurably improve the speed and accuracy of organizational responses. Indications of compromise include unusual network traffic, unusual file changes, and the presence of malicious code. Threat hunting teams leverage existing threat intelligence and may create new threat intelligence, which is shared with peer organizations, Information Sharing and Analysis Organizations (ISAO), Information Sharing and Analysis Centers (ISAC), and relevant government departments and agencies.
Source: Security and Privacy Controls for Information Systems and Organizations
Take the parable of the blind men and the elephant where each man, having never seen or touched an elephant before, touches a different part. Based on where they touched, one describes it like a snake, another like a tree, and another like a wall. Threat hunting is similar because this tactic can mean different things to different people, which makes it difficult for organizations to differentiate vendors or evaluate the value of these services.
This is where the recognition of Threat Hunting by NIST as an official cybersecurity discipline comes into play. Not only does NIST give legitimacy to this emerging discipline, it provides guidance on key aspects of threat hunting for a standardized definition within the industry.
The key features of threat hunting are:
The objectives are:
NIST not only recognizes Threat Hunting as an official discipline within the context of “Security and Privacy Controls for Information Systems and Organizations,” but also gives guidance to organizations to “employ the threat hunting.” This highlights the need for threat hunting as a component of a robust and maturing cybersecurity program regardless of the size of your company. In addition, as cyber insurance becomes more prevalent and starts to become more stringent on which controls need to be in place, it is highly likely that threat hunting will be one of those controls.
As many organizations today struggle with the basics of implementing a cybersecurity program it can be daunting to think about implementing threat hunting within your organization. Many companies do not have the number of security professionals needed and end up wearing many hats, let alone the time or skillset needed to begin threat hunting.
This is where Avertium’s Managed Threat Hunting services can help. Our Managed Threat Hunting services combine knowledgeable and skilled threat hunters with high-touch and collaborative interactions with our customers. This allows our hunters to best learn about their environments and focus threat hunting on where it will matter most. This frees your team up to concentrate on securing your environment and responding to known incidents.
The Avertium Cyber Response Unit (CRU) provides a comprehensive point-in-time forensic assessment of your environment to identify current and historic evidence of comprise that evaded your existing security controls. A common scenario in which clients would want this would be with a merger and acquisition of another company before integrating the two environments together.
A Managed Threat Hunting solution with a designated threat hunter. This solution includes personalized onboarding with your designated threat hunter to establish a knowledge base of your environment. In addition, there are weekly collaborative touchpoint meetings with your threat hunter. In these meetings, you and your hunter will review the hunts, findings, and recommendations from the previous week as well as discuss your areas of concern to guide future hunts.
Interested in implementing threat hunting to enhance your organization's cybersecurity program but don't know where to start? Contact Avertium today to learn more about our Managed Threat Hunting services and how we can help you...
Avertium is a cyber fusion company with a programmatic approach to measurable cyber maturity outcomes. Organizations turn to Avertium for end-to-end cybersecurity solutions that attack the chaos of the cybersecurity landscape with context. By fusing together human expertise and a business-first mindset with the right combination of technology and threat intelligence, Avertium delivers a more comprehensive approach to cybersecurity.
That's why over 1,200 mid-market and enterprise-level organizations across 15 industries turn to Avertium when they want to be more efficient, more effective, and more resilient when waging today's cyber war.