Cybersecurity professionals have a mixed record of success in dealing with a security landscape that is becoming increasingly complex and dangerous. We’ve done a solid job of protecting the network perimeter — keeping out people who we don’t want to gain access to our networks. But we haven’t done a particularly good job of taking care of bad actors from within. And if a threat does happen to get through our perimeter defenses, it’s a real challenge to discover the breach and prevent it from doing damage.

The time it takes us to recognize that something bad has happened on our networks is critical. We’ve got to shorten that time, and the only way to do that is to be more aware of what’s going on inside of our networks. We need to know what’s normal, versus what’s abnormal and could be potentially malicious.

CDW Threat Check, a complimentary information security service that allows organizations to assess and navigate through today’s security landscape, can help.

The Threat Check service combines a collection of tools, technologies and automation with CDW’s consulting expertise. We’ve offered this service for five years, conducting thousands of assessments, and over that time, we’ve refined it to allow you to rapidly assess where you are and how your network is performing. You’ll see how the tools and technologies you’ve deployed to combat today’s security threats are actually working for you.

How Does Threat Check Work?

The Threat Check process starts with a conversation around your specific needs and desires for having a security assessment. Next, we ship a customized appliance to your location and pair you up with a Threat Check engineer, who brings years of expert consulting experience, to look at your actual traffic.

On the technology side, the latest version of Threat Check brings together four of the top names in IT security: Cisco, Tenable, Splunk and Carbon Black. These companies have all contributed next-generation technologies to the Threat Check platform.

Cisco’s Firepower Threat Defense brings us next-generation intrusion protection, anti-malware and application visibility capabilities. These three tools allow us to passively inspect the traffic on your network to identify even the most advanced threats.

Tenable’s Nessus Network Monitor, a vulnerability management tool, enables us to passively analyze the traffic on your network specifically to highlight vulnerabilities. This amazing tool allows us to take direct action before something happens.

The Splunk log analytics tool allows us to collect all of the information from these next-generation security tools onto a centralized dashboard. This provides a comprehensive look at what’s going on inside your environment, instead of having to compile information from multiple sources to figure out what may have happened.

Finally, the Carbon Black Response tool allows us to dig deeper into the workstation and find out exactly what’s going on. This helps you discern between a false positive and a true positive and determine where you need to spend time, attention and resources.

What Happens After a Threat Check?

One of the primary benefits of going through this assessment is getting paired up with one of our Threat Check engineers. These experts have years of experience and have conducted thousands of assessments, which allows them to look at this information in the context of your environment to give recommendations for what to do next.

When we produce reports and results at the end of a Threat Check, IT leaders often say to us: “Great! We have all these tools, we have all this technology. What are we supposed to do with all of this?” Based on our observation, our experience and your environment, we’re going tell you. We’ll give you our assessment of your security posture and offer recommendations for what you ought to do next.

To learn more about how a free CDW Threat Check can help you uncover network security risks, and to request a free assessment, visit CDW.com/ThreatCheck.

This blog post brought to you by:

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

This site uses Akismet to reduce spam. Learn how your comment data is processed.