Advanced Threat Management

Sep 04, 2024

DEFEND has contributed to 33% of the NCSC’s Malware Free Networks service milestone of 10 million disruptions

In light of the NCSC’s milestone announcement of blocking 10 million cyber threats, we are thrilled to reveal that DEFEND’s SHERLOCK Threat Management service played a crucial role by thwarting over 3 million of these threats, accounting for 33% of the total.

This remarkable achievement underscores our unwavering commitment to enhancing New Zealand’s cyber resilience. Our strategic partnership with One NZ has empowered them to become the first telecommunications provider in the country to offer this advanced security service to their broadband and mobile customers since May 2023. This partnership provides an extra layer of protection seamlessly integrated into One NZ’s services.

Even more noteworthy is that the SHERLOCK Threat Management service is just one of five innovative modules available on DEFEND’s SHERLOCK platform. Our clients leverage this comprehensive service to achieve unparalleled situational awareness and visibility across the entire threat landscape, shifting their organisational security posture from reactive to proactive.

Through integrated capabilities and processes, we cover not only infrastructure assets but also address diverse use cases including organisational data, publicly facing assets, VIP or executive monitoring, intellectual property, social media, brand protection, and supply chain security. DEFEND continues to set the standard for cybersecurity, safeguarding our clients’ most valuable assets in an increasingly complex digital world.

Read full media release from NCSC here


SHERLOCK helps an organisation to understand:

How exposed the organisation is

What can an attacker see?

Where the highest priority risks are

What elements leave the organisation vulnerable to attacks, which issues do the organisation need to prioritise and remediate first?

How resilient the organisation is to attacks

What controls are required to protect against the threats, and how effectively are they operating?


Module Description
Critical Threat Protection We provide a platform to inject Indicators of Compromise (IoC) into your Sentinel and Defender for Endpoint environments. Defender for Endpoint will trigger and block any attempt to navigate to a URL or domain name that is registered as an IoC in your environment. Sentinel will raise alerts when a trigger occurs due to an IoC being noted in the logs. The feed source for the IoCs is from NCSC’s Malware Free Networks.
Enhanced Threat Protection Enhanced Threat Protection includes Critical Threat Protection, with the addition of extra feed sources or platforms to ingest into. The current platforms supported are Palo Alto, ZScaler, and Fortinet.
Threat Landscape Monitoring We provide monitoring through alerting and reporting to you on critical assets that have appeared in the clear, deep, and dark web. We will work with your team to identify these critical assets (top-level domains, IP addresses, execs, etc) to be monitored.
Exposure Management We will scan your external / internet facing assets, highlighting any potential security vulnerabilities that could lead to a system compromise.
Breach and Attack Simulation We will work with you to test the controls within your environment. Tests can be performed from an assumed breach point of view, looking at specific attack vectors an attacker may use based on intelligence gathered for your specific industries. The tests will highlight the effectiveness of the current controls and where additional controls may be required. These tests are based on real world attacks and performed in a safe simulated manner.

Download the Press Release

Fill out the form below to read the Press Release

"*" indicates required fields

Name*
By submitting , I agree to the process of my personal data by DEFEND as described in the Privacy Policy.
This field is for validation purposes and should be left unchanged.

Get in touch with us

Contact Us