Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
View our privacy policy

Overview

Leveraging EDR to accelerate the remediation of advanced threats

Discover how Redscan’s Managed Endpoint Detection and Response (EDR) service helped protect a leading healthcare provider against a sophisticated strain of malware – swiftly identifying and disrupting the threat before it spread.

Redscan case study
Industry
Healthcare
HQ
UK

The Incident

Summary

  • Large volumes of sensitive patient data
  • Targeted by sophisticated malware
  • Need for round-the-clock monitoring

As a private healthcare organisation, Redscan’s client processes large volumes of patient data, including highly sensitive medical records.

To improve the protection of this information beyond the level of security offered by traditional perimeter solutions, the organisation uses ThreatDetect – a specialist managed detection and response service supplying the people, technology and intelligence needed to swiftly identify and help address a wide range of threats.

When Redscan’s client was targeted by a sophisticated type of malware that sought to harvest employee credentials and exfiltrate data, Redscan’s experts were on hand to quickly identify, investigate and respond to the attack to minimise operational disruption and prevent patient details from being stolen.

The Investigation

Summary

  • ThreatDetect™ MDR
  • Incident analysis
  • Kill chain investigation
  • APT identification
  • Future incident prevention

Proactive Intrusion Detection System (IDS) and Security Information and Event Management (SIEM) monitoring are key features of Redscan’s ThreatDetect Network MDR service that help to identify attacks targeting on-premise, cloud and hybrid IT environments.

Having first become aware of some suspicious port-scanning activity on the client’s infrastructure, Redscan’s Cyber Security Operations Centre (CSOC) analysts were aware that an attack could be imminent.

Endpoint Detection & Response is an optional, but increasingly valuable part of the ThreatDetect service that Redscan delivers to its clients. In this case, Carbon Black’s Response solution was deployed across a series of the organisation’s endpoints deemed to be high risk, enabling Redscan’s CSOC analysts to achieve greater event visibility, enhance threat hunting and perform swifter incident response.

On this occasion, it was Cb Response that first alerted the Redscan team to the presence of malware on two of the client’s host machines. A Redscan analyst set about quickly investigating the alarm and within several minutes was able to establish that the alert was a true positive. Malware with an unknown signature had been detected and was attempting to terminate and delete the host’s Windows Defender Service, as well as connect to a series of known malicious IP addresses.

A priority two (P2) incident was promptly raised to the client by the CSOC via Redscan CyberOps, the threat notification and analytics platform included as part of ThreatDetect. By accessing CyberOps, the client was able to obtain a full overview of the incident and the remediation guidance needed to respond accordingly. On this occasion, the advice was to isolate the infected hosts from the environment, perform a full malware scan and block the observed malicious IPs at the perimeter firewall.

That wasn’t to be the end of the incident however.

Read more

Service benefits

35% off when you upgrade ThreatDetect™

A significant uptick in the volume of threat activity specifically targeting endpoints and remote workers means it’s vital to ensure that your organisation has the best endpoint security in place. To help our clients achieve greater threat visibility and coverage, we’re offering 35% off the list price of our Managed NGAV and EDR services up until the end of 2020. Benefit from:

The latest endpoint technology

Redscan's agnostic approach to technology means we support a range of NGAV and EDR technologies and will work with you to identify and deploy a solution that’s best tailored to your organisation’s security needs and is fully integrated with our CyberOps platform.

Over 250 high-fidelity use cases

Our experienced team of threat hunters don’t rely on out-of-the-box rules to detect threats. To get the most from your endpoint tool of choice, we've created hundreds of custom-built use cases and apply the latest threat intelligence to continually develop more.

Automated incident response actions

Having the capability to not only detect but also to rapidly respond to threats is essential. By leveraging the power of the latest endpoint tools, we automate incident response actions to disrupt and contain threats as soon as malicious activity is detected within your environment.

Request a quote

Complete the form to learn more and save 35% when you upgrade your ThreatDetect service

Two Redscan team members analysing cyber security intelligence

1000 characters left
View our privacy policy

Terms and conditions

  • 35% discount is off the total list price of a 12 month package to Redscan’s ThreatDetect service for endpoints (including software licences).
  • For Redscan clients that do not already subscribe to ThreatDetect with managed endpoint monitoring, minimum order quantity is 100 licences.
  • Software installation by Redscan is not included as part of the offer and subject to a supplementary fee.
  • Redscan reserves the right to withdraw or change the terms of this offer at any time.
  • Offer applies to all orders received by 31st December 2020.