DEFEND has contributed to 33% of the NCSC’s Malware Free Networks service milestone of 10 million disruptions
In light of the NCSC’s milestone announcement of blocking 10 million cyber threats, we are thrilled to reveal that DEFEND’s SHERLOCK Threat Management service played a crucial role by thwarting over 3 million of these threats, accounting for 33% of the total.
This remarkable achievement underscores our unwavering commitment to enhancing New Zealand’s cyber resilience. Our strategic partnership with One NZ has empowered them to become the first telecommunications provider in the country to offer this advanced security service to their broadband and mobile customers since May 2023. This partnership provides an extra layer of protection seamlessly integrated into One NZ’s services.
Even more noteworthy is that the SHERLOCK Threat Management service is just one of five innovative modules available on DEFEND’s SHERLOCK platform. Our clients leverage this comprehensive service to achieve unparalleled situational awareness and visibility across the entire threat landscape, shifting their organisational security posture from reactive to proactive.
Through integrated capabilities and processes, we cover not only infrastructure assets but also address diverse use cases including organisational data, publicly facing assets, VIP or executive monitoring, intellectual property, social media, brand protection, and supply chain security. DEFEND continues to set the standard for cybersecurity, safeguarding our clients’ most valuable assets in an increasingly complex digital world.
Read full media release from NCSC here
SHERLOCK helps an organisation to understand:
How exposed the organisation is
What can an attacker see?
Where the highest priority risks are
What elements leave the organisation vulnerable to attacks, which issues do the organisation need to prioritise and remediate first?
How resilient the organisation is to attacks
What controls are required to protect against the threats, and how effectively are they operating?
Module | Description |
---|---|
Critical Threat Protection | We provide a platform to inject Indicators of Compromise (IoC) into your Sentinel and Defender for Endpoint environments. Defender for Endpoint will trigger and block any attempt to navigate to a URL or domain name that is registered as an IoC in your environment. Sentinel will raise alerts when a trigger occurs due to an IoC being noted in the logs. The feed source for the IoCs is from NCSC’s Malware Free Networks. |
Enhanced Threat Protection | Enhanced Threat Protection includes Critical Threat Protection, with the addition of extra feed sources or platforms to ingest into. The current platforms supported are Palo Alto, ZScaler, and Fortinet. |
Threat Landscape Monitoring | We provide monitoring through alerting and reporting to you on critical assets that have appeared in the clear, deep, and dark web. We will work with your team to identify these critical assets (top-level domains, IP addresses, execs, etc) to be monitored. |
Exposure Management | We will scan your external / internet facing assets, highlighting any potential security vulnerabilities that could lead to a system compromise. |
Breach and Attack Simulation | We will work with you to test the controls within your environment. Tests can be performed from an assumed breach point of view, looking at specific attack vectors an attacker may use based on intelligence gathered for your specific industries. The tests will highlight the effectiveness of the current controls and where additional controls may be required. These tests are based on real world attacks and performed in a safe simulated manner. |
Download the Press Release
Fill out the form below to read the Press Release
"*" indicates required fields