HYAS, a leader in threat intelligence, adversary infrastructure, and network defense, today announced technology integration between HYAS Protect and Microsoft Defender for Endpoint. The combined solution increases Microsoft Defender for Endpoint’s proven security coverage and efficacy, offering comprehensive endpoint protection for our joint customers.
Cybersecurity threats continue to proliferate, and according to Gartner research, “The growth of ransomware, fileless and phishing attacks has urged technology providers to innovate.”(1) HYAS Protect provides a generational leap forward utilizing authoritative knowledge of attacker infrastructure to proactively protect enterprises from cyberattacks. HYAS Protect complements Microsoft Defender for Endpoint security capabilities by identifying communication with malicious destinations, enabling Microsoft Defender for Endpoint to block the attacks. With the combined capabilities, enterprises have one of the industry’s most proactive solutions for identifying adversary communication and intercepting attacks before damage occurs.
Attacks by adversaries, whether malware, ransomware, phishing, fileless, or supply chain attacks, involve communication to adversary infrastructure. HYAS Protect preempts attacks by combining infrastructure expertise, a unique data lake processing over 3.3B data points per day, and multi-variant communication pattern analysis to deliver reputational verdicts for internet infrastructure. HYAS Protect, a SaaS protective DNS solution, identifies and blocks network communication to command and control (C2) infrastructure and phishing sites used in cyber attacks. The HYAS Protect integration enables enterprises with Defender for Endpoint to block attacker communications and helps stop attacks against their endpoints.
Additional joint solution benefits include:
- Improved endpoint security by blocking phishing, malware, and ransomware communications
- Enhanced security operations center (SOC) productivity by reducing false positive alerts and resulting alert fatigue
- Cloud-native and highly scalable solution deployed using Microsoft Azure and Azure Event Hub
- Optimal device performance leverages Defender for Endpoint and avoids additional endpoint agents
- Improved network governance through visibility to DNS traffic
“Attackers continue to be creative in causing damage, and a mobile workforce increases the enterprise attack surface. HYAS turns the table on attackers by exposing and blocking their infrastructure and communication channels,” said Dave Ratner, CEO, HYAS. “The combination of HYAS Protect and Microsoft Defender for Endpoint enables enterprises to quickly deploy a unique solution that shuts the door on multiple attack vectors.”
“Members of the Microsoft Intelligent Security Association, like HYAS, offer solutions that supercharge defense work against a world of increasingly sophisticated, fast-moving threats,” said Rob Lefferts, Corporate Vice President for Microsoft Defender. “The integration of Microsoft Defender for Endpoint with HYAS Protect allows us to work together to help customers navigate the security landscape.”
Availability and Additional Information
The HYAS Protect integration with Microsoft Defender for Endpoint is available immediately. Additional details about the integration are available at https://www.hyas.com/blog/hyas-protect-integration-with-microsoft-defender-for-endpoint .
Dionisio Zumerle and Rob Smith, Gartner “Hype Cycle for Endpoint Security, 2020” 15 July 2020 https://www.gartner.com/document/3987589
HYAS, a First Nations word meaning “great and powerful,” is the world’s leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS has constructed what is arguably the world’s largest data lake of attacker infrastructure including unrivaled domain-based intelligence. HYAS leverages its infrastructure knowledge to deliver a generational leap forward in cybersecurity. HYAS provides the industry’s first security solution that integrates into an organization’s existing security technology stack to proactively detect and mitigate cyber risks before attacks happen, and to identify the infrastructure behind the attacks. Threat and fraud response teams use HYAS to hunt, find, and identify adversary infrastructure while enterprises can proactively block both known and not-yet-launched phishing and ransomware attacks at the network layer. For more information about HYAS, visit https://www.hyas.com.