With the Carbon Black Integration Network (CbIN), We’re Delivering Stronger Cybersecurity via Open

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Today is another exciting day for Carbon Black, as we unveil the Carbon Black Integration Network (CbIN), a technology partner program designed to improve cybersecurity through collective defense and powered by Carbon Black’s open APIs and the Cb Predictive Security CloudTM  (PSC). 

Security teams today are plagued with problems ranging from a lack of technical expertise to limited visibility across the security stack to an increasing volume of security attacks. Integrations from CbIN could help alleviate these challenges by providing a network of pre-integrated solutions of widely used and emerging tech solutions that use the API — this same API is available for customers to build their own integrations.

The Carbon Black Integration Network was built on the premise that a collective defense strategy is the foundation of any good security posture. By integrating solutions across each security stack, every new addition brings new functionality to a customer’s entire security architecture. Security teams gain immediate insight and quickly derive more value from existing security investments. We’ll continue to empower our entire ecosystem by adding integrations so companies can easily adopt and use solutions that fit their specific needs.

CbIN represents vendors, customers, and security technologists that have leveraged Carbon Black’s open APIs to build integrations designed to benefit everyone. As part of CbIN, 80+ technology partners have built more than 120 supported integrations by leveraging Carbon Black’s open APIs.

“We’ve always employed a proactive security strategy that protects against advanced threats. Carbon Black’s open APIs are central to this strategy – they’ve enabled us to pull threat intelligence from Carbon Black into our SIEM to keep us more secure and extend the visibility of our data to our users. In addition to the security aspect, the integration also allows us to keep an inventory of our endpoints,” said Derick Reisman, Senior IT Security Specialist at Blue Cross Blue Shield of Florida. “I can pull up a dashboard and see how many sensors are installed, what version, policy, operating system, last check-in, etc. With Carbon Black integrations, our team can move much faster.”

We’re also proud to announce Juniper Networks, LogRhythm, and Phantom are all now part of CbIN and have leveraged Carbon Black’s open APIs to build productized integration with the PSC.

“LogRhythm and Carbon Black are empowering security teams to identify behavioral anomalies, detect internal and external threats, and prioritize responses utilizing enterprise-class security analytics that leverage machine learning and advanced scenario modeling,” said Matt Winter, LogRhythm’s VP of Marketing & Business Development. “By integrating with the Cb Predictive Security Cloud (PSC), LogRhythm provides security teams with complete visibility across their cloud and physical IT environments for faster, more efficient threat detection and response.”

“As the leading security operations platform, Phantom continues to innovate with new capabilities aimed at simplifying integration with enterprise environments, while making data more readily available to SOC analysts and reducing mean time to resolution,” said Rich Hlavka, Phantom’s VP of Business Development. “By leveraging Carbon Black’s game-changing technology, the Predictive Security Cloud, Phantom is further empowering security teams with unmatched visibility, advanced analytics, and simplified workflow.”

Integrations are accessible on the Carbon Black GitHub repository. Examples of open-sourced integrations include:

  • Export all process execution and endpoint network connection events through the real-time Event Forwarder
  • Send all Carbon Black data to another storage mechanism such as Hive or Hadoop
  • Scan all collected binaries against Yara signatures
  • Perform standard queries, but process the data in a script to output it in a certain way to support reporting, period queries, enriched process trees, etc.
  • Consume threat indicators from CRITS
  • Watchlist-sharing framework
  • Subscribe to network connections and plot them on a world map

To learn more about the Carbon Black Integration Network, click here. 

The post With the Carbon Black Integration Network (CbIN), We’re Delivering Stronger Cybersecurity via Open APIs appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
79 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
How the Cloud Solves 10 Endpoint Security Problems for SMBs
Small and medium size businesses (SMBs) are facing massive cyber security challenges. In fact, according to the Verizon 2017 Data Breach Investigations report, 61% of breach victims in the previous year were businesses with fewer than 1000 employees. It’s time to proactively protect your company, and the place to start is your endpoints. Why? Because IDC research found that 70% of successful breaches begin at the endpoint. Traditional endpoint security can result in ten real and tangible problems that require lots of time and resources to address: 1. Managing Infrastructure 2. Preventing New Attacks 3. Getting the Help You Need 4. Identifying Problems 5. Responding Quickly to Threats 6. Keeping Up to Date 7. Securing Remote Workers 8. Integrating Security Products 9. Managing Multiple Agents 10. Slowing Down Endpoints

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel