With the Carbon Black Integration Network (CbIN), We’re Delivering Stronger Cybersecurity via Open

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Today is another exciting day for Carbon Black, as we unveil the Carbon Black Integration Network (CbIN), a technology partner program designed to improve cybersecurity through collective defense and powered by Carbon Black’s open APIs and the Cb Predictive Security CloudTM  (PSC). 

Security teams today are plagued with problems ranging from a lack of technical expertise to limited visibility across the security stack to an increasing volume of security attacks. Integrations from CbIN could help alleviate these challenges by providing a network of pre-integrated solutions of widely used and emerging tech solutions that use the API — this same API is available for customers to build their own integrations.

The Carbon Black Integration Network was built on the premise that a collective defense strategy is the foundation of any good security posture. By integrating solutions across each security stack, every new addition brings new functionality to a customer’s entire security architecture. Security teams gain immediate insight and quickly derive more value from existing security investments. We’ll continue to empower our entire ecosystem by adding integrations so companies can easily adopt and use solutions that fit their specific needs.

CbIN represents vendors, customers, and security technologists that have leveraged Carbon Black’s open APIs to build integrations designed to benefit everyone. As part of CbIN, 80+ technology partners have built more than 120 supported integrations by leveraging Carbon Black’s open APIs.

“We’ve always employed a proactive security strategy that protects against advanced threats. Carbon Black’s open APIs are central to this strategy – they’ve enabled us to pull threat intelligence from Carbon Black into our SIEM to keep us more secure and extend the visibility of our data to our users. In addition to the security aspect, the integration also allows us to keep an inventory of our endpoints,” said Derick Reisman, Senior IT Security Specialist at Blue Cross Blue Shield of Florida. “I can pull up a dashboard and see how many sensors are installed, what version, policy, operating system, last check-in, etc. With Carbon Black integrations, our team can move much faster.”

We’re also proud to announce Juniper Networks, LogRhythm, and Phantom are all now part of CbIN and have leveraged Carbon Black’s open APIs to build productized integration with the PSC.

“LogRhythm and Carbon Black are empowering security teams to identify behavioral anomalies, detect internal and external threats, and prioritize responses utilizing enterprise-class security analytics that leverage machine learning and advanced scenario modeling,” said Matt Winter, LogRhythm’s VP of Marketing & Business Development. “By integrating with the Cb Predictive Security Cloud (PSC), LogRhythm provides security teams with complete visibility across their cloud and physical IT environments for faster, more efficient threat detection and response.”

“As the leading security operations platform, Phantom continues to innovate with new capabilities aimed at simplifying integration with enterprise environments, while making data more readily available to SOC analysts and reducing mean time to resolution,” said Rich Hlavka, Phantom’s VP of Business Development. “By leveraging Carbon Black’s game-changing technology, the Predictive Security Cloud, Phantom is further empowering security teams with unmatched visibility, advanced analytics, and simplified workflow.”

Integrations are accessible on the Carbon Black GitHub repository. Examples of open-sourced integrations include:

  • Export all process execution and endpoint network connection events through the real-time Event Forwarder
  • Send all Carbon Black data to another storage mechanism such as Hive or Hadoop
  • Scan all collected binaries against Yara signatures
  • Perform standard queries, but process the data in a script to output it in a certain way to support reporting, period queries, enriched process trees, etc.
  • Consume threat indicators from CRITS
  • Watchlist-sharing framework
  • Subscribe to network connections and plot them on a world map

To learn more about the Carbon Black Integration Network, click here. 

The post With the Carbon Black Integration Network (CbIN), We’re Delivering Stronger Cybersecurity via Open APIs appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
68 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 7 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel