Endgame Launches New Stealth Platform to Automate the Hunt for Cyber Adversaries to Stop Damage and Loss

Platform achieves general availability after Air Force combat training exercise

 

 

 

February 29, 2016 -- SAN FRANCISCO, CA -- Endgame, Inc., a leading provider of cybersecurity software solutions to protect enterprise networks from the most sophisticated adversaries, today announced the launch of a comprehensive cyber operations platform for organizations to detect, block, and evict advanced threats at the earliest phase of the kill chain. Endgame leveraged the new platform as part of a Red Flag exercise with the Air Force, where it was deployed to proactively hunt for adversaries in Air Force networks. Endgame also announced the general availability of the platform on March 30, 2016.

Adversaries today are outmaneuvering security programs with advanced techniques that were once only available to the most sophisticated state actors. The current enterprise security stack, dependent on signatures and short-lived indicators of compromise, was not built to detect these techniques. Understanding these weaknesses, Endgame leverages its heritage in offense to empower enterprises to behave like the adversary and stealthily hunt threats within their networks.

"Over time, our conversations with security leaders made it clear that current technologies are failing against advanced adversaries," said Nate Fick, CEO at Endgame. "Companies are eager to take a more proactive approach, which is why we created an end-to-end hunt platform that allows companies to detect, block, and evict adversaries at the earliest stage of the kill chain to reduce damage and loss.

Endgame's platform enables three essential hunting requirements to help companies defend against the most advanced adversaries:

  • Stealth Operations: Today's adversaries are outmaneuvering enterprise security programs with techniques that detect advanced investments, and evade or disable them. Unlike conventional solutions, Endgame's stealth sensors operate with zero detectable persistence, covert operations, and minimal network impact, allowing customers full visibility into and uninterrupted protection from adversary activities - without tipping their hand to them.
  • Multi-Stage Detection: With current technologies, average adversary dwell time in networks is 200+ days, increasing the change that damage and loss can occur. Endgame's platform dramatically reduces dwell time by integrating automated detection of known and never-before-seen threats at the earliest stage of the kill chain. Endgame's approach enables prevention of adversary techniques, such as process injection, lateral movement, and privilege escalation, allowing customers to eliminate entire classes of vulnerabilities and any associated with zero-days.
  • Precision Response: After a threat is uncovered, current technologies force security professionals to go through a series of time consuming tasks and manual processes that elongate response time and lead to more damage control. Endgame's platform delivers precision response actions that can be deployed simultaneously at scale to eradicate adversaries with no impact on business continuity. Our targeted responses address both adversary behavior and malware variants by isolating devices, terminating adversary activity, and removing persistence, and are effective in even the most complex networks.

Endgame completed a Red Flag exercise with the Air Force; an exercise designed to simulate a near-peer combat threat environment. Endgame provided the Air Force with its new platform to automate the hunt against sophisticated cyber adversaries. The exercise was conducted at the Combined Air Operations Center at Nellis Air Force Base in Last Vegas, NV on January 13, 2016.

About Endgame

Endgame is a leading provider of endpoint security solutions that enable enterprises to close the protection gap against advanced adversaries prevent advanced attacks and detect and eliminate resident [or ongoing] attacks. The Endgame platform empowers hunt teams, incident responders, and security analysts to conduct an end-to-end hunt mission, significantly reducing the time to detect and contain adversaries. Our IOC-independent platform covers the entire kill chain, leveraging machine learning and data science to uncover, in real-time, unique attacks that evade traditional defenses and respond precisely without disrupting normal business operations. For more information, visit www.endgame.com and follow us on Twitter@EndgameInc.