CRYSTAL EYE XDR
Extended Detection & Response
IT TAKES 206 DAYS TO IDENTIFY A BREACH AND 314 DAYS TO CONTAIN IT*
A holistic approach to security is required to properly protect your organisation
Crystal Eye XDR (Extended Detection & Response) protects, detects and responds to threats across your whole organisation, all from a single unified platform. It secures your organisation from the cloud to the endpoint with a range of integrated security controls.
Security incidents are becoming more complex while compliance obligations are becoming harder to meet.
Organisations are struggling with too many products from different vendors which aren’t integrated together.
Companies need to be able to quickly identify real threats from all the noise and then initiate rapid response procedures to minimise business impact.
XDR solves these problems by avoiding the complexity of configuring and monitoring separate security systems.
XDR offers a single unified platform that delivers security protection, threat detection and incident response across your whole organisation.
Reduce risk of a security incident.
Reduce time to detect and respond to an event.
Reduce cost of securing your business.
CRYSTAL EYE ARCHITECTURE
Crystal Eye is available in the following flexible deployment options:
XDR – Extended Detection & Response
XDR involves the collection and correlation of event data from endpoint, network and cloud sensors to identify real threats anywhere in your environment and automatically trigger a coordinated response to secure your business.
The first fully-integrated detection and response platform is ready to go out-of-the-box, so it delivers a consistent level of security without the complexity of integrating products from multiple vendors.
Our network-based and cloud-based sensors (Crystal Eye XDR) deliver Network Detection & Response (NDR), in combination with our host-based sensors (XDR Endpoints) deliver End-Point Detection & Response (EDR) which all work together to deliver Extended Detection & Response (XDR).
Crystal Eye Orchestrate is our centralised management console which takes care of the service delivery and also acts as a data lake to collect all the data for correlation and response coordination. This is a significantly simpler process due to the standard data format and shared data storage used across the Crystal Eye products, which avoids the labourious task of normalising and correlating data from different technologies.
More than SIEM
XDR avoids the complex integration required with Security Information & Event Management (SIEM) and breaks down the silos between different systems by having a single data store for all events.
Where SIEM focuses on pulling the data together into events, XDR has the added benefit of pro-active and automated rapid response to stop threats in their tracks before real damage occurs. XDR goes a step further to provide advanced threat detection with research analysis labs to support defensive efforts.
Our XDR solution has integrated Security Orchestration, Automation & Response (SOAR) processes which allow you to automate responses to low-risk threats and coordinate responses to high-risk threats with the relevant resources.
These capabilities are typically not accessible for most organisations, but our integrated SOAR approach provides a comprehensive, cost effective response solution available to businesses of any size. Our automated incident response process gets executed immediately when a breach occurs and is significantly cheaper than alternative options.
Crystal Eye XDR Data Flow Architecture
MDR – Managed Detection & Response
We offer a fully managed XDR solution to take on the responsibility for operating the platform, so our certified security analysts in our 24/7 SOC are available to investigate and resolve security incidents in real-time across your network and help coordinate rapid response activities.
Our integrated managed services streamline security operations with incident response playbooks and threat hunting supported by our Automated Actionable Intelligence
This can be fully managed or can dovetail into your SecOps team to provide additional support.
This also allows MSPs to deliver fully managed detection and response services, delivered via our Crystal Eye Orchestrate console.
Integrated Vulnerability Management
Crystal Eye offers vulnerability tuning within the IPS engine to provide virtual patching against known vulnerabilities identified in your environment.
The moment you install Crystal Eye, you can schedule a Vulnerability Scan of your environment. This feature shows you the number of vulnerabilities that have been detected, then it shows you how many have exploits which are leaving you at risk. Armed with this knowledge, you can implement the recommended changes on the vulnerable systems or tune the inbuilt IDPS and firewall to stop the threat at the Crystal Eye.
IRM – Integrated Risk Management
The Crystal Eye Integrated Risk Management solution provides an automated and integrated approach to meeting your compliance obligations. It pulls together relevant compliance information and controls from multiple points across your network into a central dashboard that allows you to manage and report on that information to ensure you're compliant to a range of standards and provides a snapshot of your compliance posture at a point in time.
The compliance journey can be a pain-staking process that requires a lot of investment in time and resources. Our IRM module automates the majority of the work required to achieve and maintain compliance, thereby significantly reducing the cost for your business to gain a competitive edge in the market.
Crystal Eye IRM can also be integrated into our eCISO (electronic Chief Information Security Officer) product and vCISO (virtual Chief Information Security Officer) service to deliver a comprehensive solution to Integrated Risk Management.
Crystal Eye Firewall
The Crystal Eye platform includes a full-featured next-generation firewall with a range of integrated security controls such as firewall, IPS, secure web gateway and secure email gateway. This ties into our overall XDR platform to deliver superior protection for your business.
Our Automated Actionable Intelligence (AAI) delivers the most timely and accurate threat intelligence, all integrated into the Crystal Eye platform. Our fully-verified intelligence feeds provide deeper context and integrates seamlessly with the platform to enhance your decision-making. This helps prevent attacks and reduce risk by helping you understand the historical context of where these cyber threats originated, who is behind them, when have they attacked, what methods they used and what they're after. Get on-demand access to current and historical metadata on IPs, domains, and other related threat intelligence to help research cyber threats and investigate incidents.
In addition to reputation intel, you get condemnation evidence, deep context, history, and detection information. It's all searchable in an easy-to-use cyber threat analysis portal that includes:
- Trends and timestamps of when a threat was seen and the associated category
- Type of threat and exploit kit names when available
- Related samples used in associated or related attacks
- Actionable IP and Domain Reputation intelligence
Red Piranha provides up-to-date managed IDPS rule sets aimed at giving actionable protection and detection capability. We serve our customer base with over 46,000 dedicated rules that allow the best-in-breed threat hunting capability, with the Red Piranha threat hunting team working round the clock to track threats and reduce risk to customers.
An Integrated Approach
Crystal Eye XDR delivers a comprehensive solution across a range of security areas, with the whole platform working together to protect, detect and respond to threats in your environment.
This all works together to provide a single defence-in-depth platform to mitigate risks to your organisation.
Our modular approach can be catered to meet the needs of each company, so you can pick and choose what matters most to you without implementing the whole solution.
It's about business outcomes and managing risks specific to your needs, not just about technology for the sake of it.
*IBM Cost of a Data Breach Report, 2019