Enterprise IT management powerhouse ManageEngine, a subsidiary of Zoho Corporation, has achieved remarkable progress in an age where cyberattacks are becoming more complex and blending in with lawful pursuits. An innovative feature inside ManageEngine’s Security Information and Event Management (SIEM) solution, Log360, was unveiled during the prestigious ManageEngine User Conference held at The Ritz-Carlton, Dubai International Financial Centre. Thanks to this ML-driven functionality, businesses can now track the actions of their cyber enemies with pinpoint accuracy, ushering in a new era of cybersecurity. It is a major step forward in the fight against breaches since it shows the whole exploit triangle: users, entities, and processes.
Tackling the Urgent Need for Swift Breach Responses
Manikandan Thangaraj, vice president of ManageEngine, shed light on the current cyber threat landscape. “Today’s cyberthreats masterfully blend into the fabric of legitimate activity, weaponizing stolen credentials, mimicking trusted processes and exploiting human vulnerabilities. These insidious tactics create a critical challenge: an extended data breach life cycle. It takes an alarming 277 days to identify and contain a data breach, with expenses surging by 23% after surpassing the 200-day mark. Manual, unguided threat analysis is a losing battle—a labyrinth of multi-tool chaos. By offering a dynamic tapestry of insights into user attributes, process lineage and threat intelligence, Log360’s ML-powered exploit triad analytics transcends from merely assisting detection to enabling better comprehension. This makes it a game-changer in reducing the breach life cycle.”
Key Enhancements Unveiled
The enhancement of Log360’s threat detection and incident response (TDIR) module, Vigil IQ, now includes a dual-layered threat detection system, initially launched last year. This enhancement brings to the forefront advanced analytics for deeper insights and quicker response times, featuring:
- A Unified Threat Hunting Approach: A single console now brings together user, device, and process analytics, allowing security professionals to conduct thorough investigations via the Incident Workbench.
- ML-Enhanced Contextual Data Analysis: The solution’s in-depth contextual analysis is enriched with insights from User and Entity Behavior Analytics (UEBA), process tree visualization, and the risk scoring of IPs, URLs, and domains.
- Comprehensive Process Hunting Tools: The suite is further strengthened by the process flow probing capability and correlation rules for detecting suspicious process activities, offering a full set of tools for process hunting.
Also read: INIT Capital’s $3M Seed Funding Fuels DeFi Sector Innovation with Groundbreaking Liquidity Hook
Additionally, the latest version of Vigil IQ boosts the cyber investigation dashboard, enhancing threat detection capabilities with:
- A Comprehensive Correlation Package: This feature enhances the Incident Workbench with over 100 ready-to-use correlation rules, facilitating the effective detection of common attacker tools and live off the land (LOTL) attacks.
- Integration with VirusTotal: The scope of the Advanced Threat Analytics feature has been expanded through integration with VirusTotal, a leading threat intelligence service, providing improved visibility into external threats and risk analysis.
With this strategic update to Log360, ManageEngine is not just redefining cybersecurity standards but also equipping enterprises with a powerful tool against the evolving digital threat landscape. This innovation underscores the company’s commitment to leading the charge in cybersecurity solutions, setting a new benchmark for SIEM systems globally.
Legal Disclaimer: The Editor provides this news content "as is," without any warranty of any kind. We disclaim all responsibility and liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. For any complaints or copyright concerns regarding this article, please contact the author mentioned above.