Our experts are available to speak on these events and your cybersecurity readiness by contacting us here. Ensuring you’re informed and protected is key to staying secure. The SentinelOne team stands ready to assist in these times of uncertainty. Referencing FireEye’s SUNBURST countermeasures.
#FIREEYE SOLARWINDS SOFTWARE#
Resetting service account passwords if service accounts were used with SolarWinds software.Resetting all credentials used by or stored in SolarWinds software.In addition, please incorporate best practice countermeasures including: Our recommendation to customers and the community-at-large is to follow SolarWinds’ security advisory instructions. All SentinelOne customers have access to a new hunting pack which includes custom Deep Visibility hunting queries for the latest SUNBURST and FireEye breach IOCs.SentinelOne’s Singularity Cloud blocks all reported IOCs.In the SolarWinds attack, dubbed “SUNBURST,” SentinelLabs research has confirmed that devices with SentinelOne agents deployed are specifically exempt from the malicious payload used in the reported IOCs. As presented in the SolarWinds attack, SUNBURST does not trigger malicious activities on devices protected with SentinelOne.įollowing the SolarWinds supply chain attack: In the released IOCs associated with both the FireEye and SolarWinds breaches, SentinelOne customers are protected. According to public and private sources, this supply chain attack is linked to FireEye and other US federal entities being targeted. Update: on Sunday, Dec 13, it was reported that SolarWinds was the subject of a sophisticated supply chain attack targeting SolarWinds Orion Platform software, their enterprise IT monitoring solution. Symphony is also expected to launch the McAfee Enterprise Secure Service Edge (SSE) portfolio as a separate business later in the quarter, which will include Cloud Access Security Broker (CASB) and Secure Web Gateway (SWG) and Zero Trust Network Access (ZTNA).To Our Customers, Prospects, Partners, and the Cybersecurity Community: With a combined product portfolio that spans endpoint, network, messaging, data protection, and cloud services, Trellix has an impressive multi-technology portfolio to address the promise of XDR.” “It is a monumental effort made possible with the right security partner. “However, integrating context and delivering outcomes takes resources and work. “The promise of XDR dramatically improves security efficacy, and the vendors that can deliver on that promise will capture market share,” said Frank Dickson, program vice president, Cybersecurity Products, IDC. With its improved insight and comprehensive threat context, STG says analysts can ultimately save time and act decisively to tackle malicious activity. This ecosystem has been designed to boost the effectiveness of security operations by providing customers with the capability to leverage over 600 native and open security technologies. “Trellix’s XDR platform protects our customers as we bring security to life with automation, machine learning, extensible architecture, and threat intelligence.” “As today’s organisations push to achieve digital transformation, a strong security foundation is required to ensure continued innovation, growth and resiliency,” explained Bryan Palma, chief executive officer at Trellix. The group says Trellix will deliver its XDR brand promise to build resilient and confident organisations through tech called ‘living security’, which learns and adapts to protect operations from advanced threats across multiple attack vectors. “Customers can expect Trellix’s living security platform to deliver bold innovation across the XDR market.” “We are incredibly excited to have Trellix in the STG portfolio,” said William Chisholm, managing partner at STG. Cyber security firm FireEye hit by 'state-sponsored' attack