GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Sometimes Something in Security Comes Along That’s Worth Looking At

security solutions

There are hundreds, thousands really, of potential IT vendors vying for the attention of the same comparatively small group of enterprise IT buyers that can’t physically absorb that amount of sales activity, dozens if you count established players. The weight of such numbers makes it impossible for us to promote even 1-5% of new vendor products with any real frequency without the risk being counterproductively intrusive.

 

Yet customers also tell us they want expert curation and distillation of the good stuff that can meaningfully solve problems. It’s a delicate balance.

 

Every once in a while, something pops up that’s compelling enough to mention for its relevancy, differentiation, problem-solving effectiveness with minimal operational overhead. We found one in the security space. We actually found them quite a while ago but now they’re better than ever and have evolved to “let me interrupt you” status.

 

It’s a safe bet to argue the front-line battle in security is being waged at the end point. If there were no users, networks and data would be substantially more secure because too many users unwittingly do bad things that can cause devastation at scale. Like letting their credentials get stolen through phishing. 

 

With the exception of MFA, security controls can’t protect IT infrastructure from access through stolen credentials. And MFA isn’t everywhere, so investing in protection to address credential phishing at scale is vital and indispensable. 

 

However, that investment effort tends to focus on email. After all, email is where credential phishing (and malware infections) usually starts. But email security can’t protect from other forms of digital communication: web browsing, SMS, social media, ‘wolf’ apps in ‘sheep’s’ clothing, even social engineering that directs you to a phishing site, etc. The Mimecast’s and Proofpoint’s of the world are essential, for sure. They’re also insufficient.

 

In addition to NGFW’s, the other must have is modern EPP, which has evolved into EDR and xDR etc. which, I suppose, is a way to elevate the conversation by suggesting modern EPP is critical and needs to be more effective, hence it’s not AV or EPP anymore but EDR and xDR, etc. It does seem to be working based on an emerging trend of AV titans of the past getting replaced by what we suspect to be the EDR/xDR titans of the future.

 

Given its importance as a vital point of control, it’s still somewhat surprising there isn’t more widespread attention paid to modernizing end point protection. I’ve actually heard variations of the following a number times: “Well, our maintenance [that covers our antiquated, signature based, AV solution] goes until 2023 so we’re not going to look at that right now.” 

 

SlashNext was founded to identify and block zero-hour phishing attempts in real-time from any form of digital communication channels with a stunning false positive rate of only 1 in 1MM. All of this protection comes in the form of a browser plug-in for Windows and Mac. For iPhone and Android devices, the protection comes in the form of an App. This allows the protection to take place on device and not through a proxy.

 

It also provides for user privacy.

 

And it’s simple to rollout at scale in an automated way providing for the kind of user experience that users ask for.

 

Secret Sauce? It uses Natural Language Processing, AI and ML to block zero-hour phishing attempts.

 

It works with EDR/xDR and NGFW from the likes of Crowdstrike, Palo and SentinelOne. In fact, it was rated the number 1 app in Palo Alto’s XSOAR marketplace. SlashNext discovered 50,000 infected URLs hosted on a very large and venerable Silicon Valley company who provides IaaS. These URLs were hosted on their legitimate and trusted infrastructure. That company stated, it was “extremely rare to see this quality of detection and data.”

 

It can also be a SOAR admin’s best friend because it virtually eliminates oceans of user emails reporting on phishing attempts that need investigation. Is that a challenge in your SOAR operation?

 

And its AI and ML engine gets better every day because it learns and learns and learns….

 

IT Security Groups can’t blacklist OneDrive, DropBox, Facebook, Gmail, etc. With SlashNext, they don’t trust any URL which is why they preemptively mined the global web 24×7 to identify and block even zero hour phish in real-time.

 

There’s a proven track record too (active for 5 years). Once again, there’s is no performance impact because all blocking of malicious URLs is done on device. Management of SlashNext is SaaS based and provides a set and forget administration process. The likes of Palo Alto Networks, Crowdstrike and Google all have given SlashNext praise for their quality of detection and efficacy. 

 

It’s relevant: What’s more relevant than preventing users from getting phished? I already mentioned it was accurate and they can prove it.

 

I humbly recommend you check them out. Why not benefit from a solution that delivers maximum utility for minimum effort?

Author

Share this article

You might also like:

As the head of GDT’s security practice and an industry veteran, Jeanne Malone and her team help customers worldwide advance their cybersecurity posture. One of the biggest cybersecurity game-changers is artificial intelligence (AI). We asked Jeanne to weigh in on leveraging AI and machine learning in cybersecurity to improve intrusion

NCAA basketball coaching legend Bobby Knight once said: “Good basketball always starts with a good defense.” Winning teams understand their opponents’ strengths and weaknesses, as well as their own. They study their opponents’ plays and anticipate their next moves. The same concept is true for cybersecurity, which is why, at

Dallas, Texas, January 31, 2024 – General Datatech (GDT), a leading global IT services provider, has worked with Juniper Networks to launch GDT Network as a Service (NaaS), Powered by Juniper. This modern networking approach simplifies network design, implementation, and management by delivering a flexible, subscription-based option to access the industry’s