F-Secure's elite threat identification team prepare your organization for advanced cyber attacks, before and after they happen. Our fully managed service is designed to detect the most skilled of attackers within minutes, with around-the-clock coverage. F-Secure Rapid Detection & Response Service gives you a small number of filtered and accurate detections, enabling you to respond to real threats with actionable guidance from our experts.
Attackers will first gain access to your IT infrastructure. This typically happens either by exploiting a known vulnerability in one of your servers, or by using a combination of spear-phishing emails and web exploits targeting one of your customer-facing teams.
After gaining an initial foothold in your IT infrastructure, the attackers will try to access or seize control of the data they're after.
Typically, they accomplish this by using existing IT administrator tools included in Windows, Mac and Linux operating systems, such as PowerShell, Windows Remote Management and Service Commands.
The F-Secure Rapid Detection & Response Service includes lightweight intrusion detection sensors for endpoints, networks and decoy servers that are deployed across your IT infrastructure. The sensors monitor activities initiated by the attackers, and stream all information to our cloud in real-time.
Our cloud-based service hunts for anomalies in the data by using a combination of advanced technologies, such as real-time behavioral analytics, big data analytics and reputational analytics. Anomalies are hunted from two perspectives: known and unknown malicious behavior.
The use of different types of analytics ensures that attackers are not able to remain undetected, even when using evasion tactics designed to fool specific detection methods.
Anomalies are flagged to our threat hunters in the F-Secure Rapid Detection & Response Center, who work 24x7x365 to verify them and filter out false positives.
Once our threat hunters have confirmed that an anomaly is an actual threat, they will alert you in less than 30 minutes. Our threat hunters will guide you through the necessary steps to contain and remediate the threat. We also provide detailed information about the attack, which can be used as evidence in criminal cases.
Our on-site incident response service is also available to assist you in difficult cases, or in cases where your own experts are unavailable.
At the core of the F-Secure Rapid Detection & Response Service is our F-Secure Rapid Detection & Response Center, which is the base of operations for all of our detection and response services.
At the center, cyber security experts work 24/7 to hunt for threats, monitor data and alerts from customer environments, and flag anomalies and signs of data breaches.
Their main tasks fall into three different roles:
Hear from the people who use F-Secure Rapid Detection & Response Service
System Administrator, Alfred Ritter GmbH & Co. KG
Head of ICT, MTV
Global IT SOC Manager in the Finance Industry
A Gartner Peer Insights Customer Review for F-Secure Rapid Detection & Response Services as of September 11, 2018
Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences, and do not represent the views of Gartner or its affiliates.
Lightweight, discreet monitoring tools designed to be deployed on all relevant Windows, Mac OS, and Linux computers within your organization. Sensors are custom-configured for each organization and are easily deployed using standard IT remote administration tools. These components collect behavioral data from endpoint devices using well-documented mechanisms, and are specifically designed to withstand attacks from adversaries. The sensors are data collectors, requiring very little maintenance. The sensors are also designed to function in Payment Card Industry Data Security Standard (PCI-DSS) compliant environments.
Network and Decoy Sensors are designed to be deployed across your organization's network segments. Decoy Sensors work as honeypots, giving you an effective, low-noise method of identifying post-breach activity. Honeypots emulate popular services including SSH, HTTP, and SMB, and are designed to mimic Windows servers, workstations, file servers and even VOIP servers. Network Sensors analyze all connection attempts to and from your organization's network, and record selected network traffic, analyzing files that arrive to the system.
You will be alerted within 30 minutes from the moment an anomaly is flagged as a threat. With the dashboard, you can stay on top of all alerts that have been reported as actual threats, as well as other suspicious activity that our threat hunters have reviewed and detected as potential threats. Actionable guidance from our experts helps you respond to threats promptly, and manage the verification process of less critical detections. In addition, the dashboard provides continuous visibility into all installed sensors and hosts.
All data collected from customer deployments is sent through encrypted channels and stored on controlled, secured servers. Access to data is carefully restricted to only authorized users and authorized purposes. All data is physically stored in Europe. We respect our users' privacy and our customers' need to protect sensitive data and corporate secrets – data collected from one customer is never shared with other customers. Contact us for more information on our privacy and confidentiality policies, especially in regards to data handling.
Every company has valuable assets to protect. Watch the story of a data breach nightmare, and take the test to see how prepared you are for a cyber attack.