CYREBRO Solution Description
Welcome to CYREBRO
CYREBRO pioneered the first online managed Security Operations Center (SOC) Infrastructure with the mission of bringing enterprise-grade cybersecurity to businesses of all sizes, ensuring fast and efficient responses to cyber threats and their mitigation. End customers benefit from a first-of-its-kind, complete SOC Infrastructure offering with advanced 24/7/365 capabilities, including threat intelligence and hunting, forensic investigation, and incident response.
Solution Overview
To provide a state-level, managed SOC Infrastructure, CYREBRO utilizes the knowledge and expertise of Israeli cyber experts, and the ongoing wisdom of the masses to teach and operate the ML-based detection, investigation, and response that is the “CYREBRO Brain”.
All of this is delivered using CYREBRO’s online, interactive SOC Platform. The SOC Platform integrates all your security, network, infrastructure, and cloud logs into one central command, and provides complete clarity, insights, and real-time actionable steps to mitigate and remediate cyber threats.
The Offering
- Data lake and correlation engine capabilities
- Over 1,500 ready-made, unique and proprietary detection algorithms, written, tested, and executed over years of real cyber operation and detection experience
- Next-generation SIEM
- In-house automation and orchestration capabilities
- In-house cyber threat research
- In-house cyber threat intelligence
- Log collection – we support log collection across multiple platforms and environments covering hundreds of leading log types and supporting systems
- Proactive threat hunting
- Data ingestion validation and enhancement*
Additionally, CYREBRO empowers the client’s security teams by providing 24/7/365:
- Advanced monitoring and investigation capabilities
- Digital forensics and incident response
*CYREBRO does not provide “hands-on” integration support. For any integration requirements, please
see the “CYREBRO certified integrator” list. Only official and certified integrators will be supported by
CYREBRO Labs
SOC Capabilities
Proactive Detection
-
Threat Intelligence
-
Threat Hunting
Security Operations
-
Strategic Monitoring
-
Optimization
Response Services
-
Incident Response
-
Forensic Investigation
SOC Capabilities
Proactive Detection
-
Threat Intelligence
-
Threat Hunting
Security Operations
-
Strategic Monitoring
-
Optimization
Response Services
-
Incident Response
-
Forensic Investigation
Security Operations
Strategic Monitoring & Detection
CYREBRO’s approach to monitoring, detecting, and responding, is based on continuously learning, improving, and evolving our detection algorithms. It involves the continuous 24/7 live monitoring of organizational assets, networks, and systems, while constantly learning the evolving threat landscape and understating risks and their use cases across the globe in near real-time. This works in parallel to constantly adapting to clear and relevant alerts. CYREBRO is specifically designed to utilize ML and internal cyber experts across the millions of machines connected to it, to assist clients in mitigating security risks and effectively operating their security infrastructure. The goal is to provide the organization with a clear, analyzed, and real-time view of its security posture, enabling it to make informed data driven decisions about risk management and resource allocation.
Optimization
This refers to the process of ever improving the effectiveness and efficiency of CYREBRO’s SOC Platform. This involves fine-tuning the system to ensure that it is collecting the right data, analyzing it effectively, and providing actionable insights. The goal of the optimization is to improve the accuracy and speed of threat detection, reduce false positives, and enable faster incident response times. This is the live, ongoing process within the “CYREBRO Brain”, based on a combination of ML capabilities, statistics, correlations, and trends with a highly skilled, highly experienced cyber team.
Optimization includes:
- Refining alerts / rules: By fine-tuning alert rules, organizations can reduce the number of false positives generated while ensuring that important security events are not missed.
- Reducing noise: By filtering out unnecessary data, such as known benign traffic or redundant log entries, CYREBRO can focus on the events that are most relevant to security.
- Increasing data visibility: By collecting and analyzing a broader range of relevant event data, including data from cloud environments and endpoints.
- Automating response: By automating incident response workflows, CYREBRO reduces response times and improves the efficiency of the teams.
- Regular tuning and maintenance: Including updating correlation rules, ensuring data ingestion is in accordance with the updated scheme and patching core infrastructure.
Proactive Detection
Threat Intelligence
The role of the threat intelligence element within CYREBRO is to provide relevant and actionable intelligence related to potential security threats, and to constantly correlate relevant indicators and potential threats, within every relevant technology connected to CYREBRO.
Primary responsibilities include the following:
- Collection of threat data: Collecting information from various sources such as internal security logs, external threat intelligence feeds, and open-source intelligence.
- Analysis of threat data: Analyzing the collected data to identify potential threats, attack patterns, and indicators of compromise (IOCs).
- Enhancing threat data: A process of enrichment of the data pool in-order to add context, relevance and actionable items for each IOC.
- Sharing threat intelligence: CYREBRO disseminates the threat intelligence reports, alerts, and advisories to the appropriate stakeholders within CYREBRO, including the incident response team and security analysts.
Threat Hunting
CYREBRO’s threat hunting process is a proactive approach to identifying potential cyber security threats which involves searching for indicators of compromise (IOCs) and other anomalous activity that may have otherwise gone unnoticed by traditional security measures.
It encompasses the “wisdom of the crowd”, lessons learned, derived from past and ongoing cases together with vast experience which was accumulated over the many years of operation in both the private as well as the governmental sectors.
The process of threat hunting involves processing vast amounts of data from various sources. The data is then analyzed to identify patterns, anomalies, and potential IOCs that may indicate the presence of a security threat. This process is often conducted or guided by skilled security analysts who have in-depth knowledge of the attack life cycle and methods of operation.
By proactively identifying potential security threats, CYREBRO’s threat hunting capability enables organizations to respond quickly and effectively to security incidents, reducing the risk of data loss, financial damage, and reputational harm. It also allows organizations to gain a deeper understanding of their security posture and identify areas where additional security measures may be necessary.
Overall, CYREBRO’s threat hunting capability provides a proactive approach to cybersecurity that goes beyond traditional security measures, helping to ensure that potential threats are identified and neutralized before they can cause harm.
Managed Detection and Response Services
Incident Response
CYREBRO’s incident response provides organizations with a structured and efficient approach to managing security incidents. Our unique teams of experienced incident responders, with state and private level experience, have conducted hundreds of IR cases across the globe, of all shapes, sizes, and level of complexity. CYREBRO follows a well-defined process that involves preparation, identification, containment, analysis, eradication, and recovery in-order to achieve optimal results in a timely manner and a forensically sound fashion.
CYREBRO, in consultation with the customer, will classify the incident following the severity levels. If appropriate, the IR team will establish and provide to the client a communications protocol that limits communications related to an incident to the appropriate group, provides for proper labeling of documents and provides for inclusion:
- Determining, developing, and implementing, an appropriate strategy for responding to an incident
- CYREBRO will lead efforts to investigate, contain, and resolve the incident
- Conducting the post-incident analysis
- Participating in the review and closure of an incident
- Facilitating the creation of operational procedures
- Reviewing and updating the customer IRP as needed
In the case of an immediate threat, such as an ongoing live cyberattack on the organization, the response team is available 24/7 to lead in blocking, containment, and remediation of the event.
- Each IR activation will include a full “postmortem” detailed report on the event
- CYREBRO will conduct first response online and will manage the incident with client’s POC until closing of the incident
Digital Forensics
CYREBRO’s digital forensics provides organizations with a thorough and efficient approach to investigating and analyzing digital evidence related to cybersecurity incidents. In our process, expert digital forensics analysts follow a rigorous procedure that involves acquisition, preservation, analysis, and reporting which remains “forensically sound”.
In the acquisition stage, CYREBRO uses advanced tools and techniques to gather digital evidence from various sources while taking steps to preserve the integrity of the evidence to ensure that it is admissible in court, if necessary. Once the evidence has been acquired and preserved, CYREBRO analyzes it to determine the cause and extent of the security incident. CYREBRO uses a range of forensic techniques, including data carving, memory analysis, and timeline analysis, to identify potential indicators of compromise and reconstruct the sequence of events leading up to the incident.
CYREBRO prepares a detailed report outlining the findings of the investigation, including a description of the incident, the methods used to acquire and analyze the evidence, and any potential legal or regulatory implications. We also provide recommendations for improving the organization’s security posture and preventing similar incidents from occurring in the future.
Overall, CYREBRO’s digital forensics provides organizations with a reliable and effective way to investigate security incidents, preserve digital evidence, and analyze data to identify potential threats.
How Does It Work
Watch the walkthrough of the CYREBRO SOC Platform here:
CYREBRO End-to-End Lifecycle
- Client Logs
With a single click, clients can connect any log-generating system — such as EDR, cloud environments, or network analyzers — to the CYREBRO Platform, creating a unified system that provides a complete view of your security landscape. -
Log Parsing
The ETL (Extract, Transform, and Load) process in our MDR solution begins with the automatic collection of logs from various systems. This data is parsed and normalized using AI algorithms, which organize the logs based on their logical parameters, following the OCSF (Open Cybersecurity Schema Framework) schema. This standardization ensures that data from different sources can be easily analyzed and correlated.The process is continuous, with no stops, allowing for real-time parsing and normalization. During this stage, potential security threats, known as Indicators of Compromise (IOCs), are identified and enriched with detailed information. This enrichment aids in more effective threat detection and response.
-
Security Data Lake
All ingested data is securely stored and efficiently managed within our proprietary Security Data Lake built in partnership with Google Cloud. This centralized repository allows for seamless data filtering, organization, and adjustment to different views, making searches, queries, and investigations straightforward.Users can easily locate specific information, such as narrowing down by sections or entities, which significantly enhances threat hunting capabilities. Our platform supports both hot and cold storage, ensuring quick access to current data while also providing long-term retention for historical analysis. The system is designed to handle virtually unlimited data, enabling extensive investigations and future-proofing your security operations.
-
SOAR (Automation Layer)
In In this stage, our SOAR system automates the correlation of detections and events, triggering playbooks to streamline the response process. These automation workflows not only enhance the investigation stage by enriching indicators and filtering out false positives but also ensure that all relevant data collection is carried out and maintains consistency. This eliminates the need for manual data gathering, saving time and reducing human error. By automating this crucial part of the process, it ensures that the information provided to analysts is both accurate and actionable, enabling faster, more accurate decision-making.This automation allows for immediate action without the need for an analyst to manually intervene at every step. The system knows when specific events occur and automates the necessary responses, ensuring that analysts receive precise information to conduct efficient and effective investigations.
-
Investigation Layer
In this layer, we build the attack story by connecting individual detections and points of interest into a cohesive and unified narrative. Automated systems first process the data, filtering out false positives and organizing the findings to present a clearer, more accurate picture of the incident.SOC analysts then review the refined results, reach a verdict, and provide actionable mitigation steps. This process not only helps in understanding and responding to the current threat but also contributes valuable insights that enhance future analyses and threat detection capabilities.
-
SOC Platform
All information and data converge within our SOC platform, providing users with a comprehensive view of their entire security landscape through a single pane of glass. The platform integrates logs into cases as needed, organizes these cases to distinguish clearly between detections and investigations, and presents actionable insights.Users benefit from intuitive dashboards and detailed reports, enabling effective communication, management, and decision-making across the security environment.
-
Detection Engine
The Detection Engine operates continuously across all stages of our security process, unlike traditional SIEM systems where detection is centralized and limited to a single area. In our solution, detection is decentralized and integrated into every step, from the ingestion pipeline to the data lake, SOAR, and attack story creation.Multiple detection engines run in real-time, each tailored to its specific environment, ensuring optimal performance without congestion or consumption limits. This distributed approach allows for enhanced stability, scalability, and flexibility, enabling us to dynamically adjust and optimize detection capabilities as needed.
Monitoring and Detection
What Does CYREBRO Monitor & Detect?
CYREBRO monitors all your business systems and security tools, collects, and analyzes the data, and interprets suspicious events with an attacker’s mindset. Strategic monitoring and detection are achieved through a combination of proprietary detection and response algorithms, plus our team’s extensive knowledge of various monitoring methodologies.
CYREBRO creates its own custom, proprietary rules, instead of using generic, out-of-the-box rules. Detection and response algorithms are created based on specific attributes, not specific systems, so CYREBRO is able to detect a wide range of threats, covering the attack landscape. Detection attributes are based on the MITRE framework, CYREBRO incident response cases, and our threat research.
CYREBRO clients benefit from the “wisdom of the crowd,” meaning that the rules created for a single client incident will be applied proactively to the entire client base.
CYREBRO Detection
Rule Logic
Rules are created to ingest two different data streams. The first are raw events
coming from non-security tools and critical assets, and the second are alerts sent
by security tools. All types of rules created fall into these categories:
- Single event rule (based on an alert from one system)
- Aggregation rule (multiple events from one system)
- Correlation rule (multiple events from multiple systems)
- Machine learning and Al rules – Conclusions reached by the machine after learning mass data and solidifying statistics and outcomes
CYREBRO Monitoring
CYREBRO has three categories of alerts:
- Hunting leads – alerts created for the threat hunting team to proactively detect threats
- High fidelity alerts – high risk, high severity alerts that trigger CYREBRO investigation
- Attack stories – a chain of behavior aggregated by hunting leads and high fidelity alerts
CYREBRO monitors and responds to all alert types, but the alerts that are visible in the SOC Platform consist of high-fidelity alerts and attack stories. Instead of escalating every benign alert, CYREBRO shows you what needs to be dealt with, and how our security analysts are dealing with it, instead of overwhelming you with countless harmless alerts. System and network activity can occur as part of normal network or as adversarial activity. Therefore, events and alerts should not be viewed in isolation, but as part of a chain of behavior that can lead to other activities, based on the information obtained.
Getting Started
Platform Integrations
Event collectors are deployed to collect event data. Systems and log sources must be integrated only by a certified CYREBRO integrator. CYREBRO will provide a list of certified integrators to work with.
The following is an online list of integration types that CYREBRO supports – www.cyrebro.io/integrations. It may be amended from time to time.
Platform integration is performed by a third-party certified CYREBRO Integrator.
* Customized plugins may be developed per request.
Machine Requirements: A lightweight machine is required to serve as an event collector.
Cold Storage
- CYREBRO offers the option to extend the default Log storage of the SIEM in a “cold storage format” at a minimum cost.
Custom Rule Creation
- Should a client require specific customized rules, a “custom rule package” can be added. To clarify, exclusion of existing rules and exceptions to the CYREBRO rule base – do not fall under the “Customized rules”, and do not bear a cost to them.
Plugin Creation
- CYREBRO supports all log types and sources as stipulated online in our list of integrations: www.cyrebro.io/integrations/ – CYREBRO can develop a customized plugin (That does not exist in our current list) per clients request, at a cost.