Q1. How exactly will Darktrace’s recent integrations with Zscaler, Okta, and Duo Security help enterprise organizations? What issue is it that the integrations are designed to address?
While there is some debate about the strict definition of Zero Trust, at its core, the concept is both a practical methodology and a mindset for organizations; it is a fundamental part of modern security strategies. Zero Trust architectures often involve micro-segmentation, asset discovery, data classification, and granular role-based access controls.
This process begins with ensuring complete visibility into all users, data, and devices within the environment, often by investing in security tools capable of continuous monitoring across the complex digital infrastructure that can help validate and inform zero-trust policies. This total visibility is a fundamental capability that Darktrace offers. By building an understanding of “self” for an organization, Darktrace can identify when something out-of-the-ordinary occurs and autonomously respond to prevent attack escalation, data exfiltration, and more.
Darktrace’s zero-trust integrations add value for Darktrace customers and customers of our partners, including Zscaler, Okta, and Duo Security. These API integrations allow organizations to accelerate their adoption of zero trust architecture and identity management services by feeding data into Darktrace’s Self-Learning AI engine to identify and neutralize anomalous behaviors. Darktrace brings visibility into all coverage areas of a modern organization, from the cloud to endpoint, to SaaS and operational technology.
In addition to this visibility, organizations must shift their mindsets away from inherently trusting users. Instead, organizations must accept that every new user brings an additional element of risk and fold this risk into overarching business strategy. These strategies could include creating new policies to limit individual access to only what is required for employees to complete their unique job responsibilities.
By very definition, Darktrace is Zero Trust in nature; it does not assume trust for anything; rather, it builds a bespoke profile for each organization and detects what does not fit without pre-defined rules, expectations, or trust. For example, Darktrace can detect if an employee is downloading files that they usually wouldn’t or if their devices are communicating with a device operated by a malicious party.
Q2. Why should organizations not delay any longer in embracing Zero Trust as a fundamental part of their security strategy? What’s driving the need for it?
Adopting zero-trust architecture can be an extensive iterative process that requires constant reevaluation and adjustments to an organization’s bespoke digital environment. However, businesses can shift their mentality toward zero-trust initiatives almost immediately.
The shift also requires cybersecurity leadership to assume that a breach has or will occur within their environment, prioritize and patch existing vulnerabilities, and consistently evaluate and update their security postures to avoid coming threats.
The global threat landscape is becoming increasingly complex. While cyber defenses have progressed leaps and bounds over the last decade, unfortunately, so too have threat actors and attack methods. At RSA Conference and Gartner’s Security and Risk Management Summit earlier this year, much of the conversation focused on how attacks are becoming quicker, more dynamic, and harder to predict.
Regardless of size or industry, every company faces more known unknown attacks. Instead of trying to keep threat actors out of your organization’s infrastructure, business leaders should prioritize business resilience practices that consider cyber risk and incorporate technologies that contain a level of automation to stop attacks in their tracks - before they can disrupt operations and cause significant damage. To combat more sophisticated and machine-speed attacks, human defenders must embrace Zero Trust as one pillar of their cybersecurity programs, focused on cyber hygiene, minimizing risk, and augmenting human teams with artificial intelligence (AI).
The mass amounts of data and IT are too complex for humans to handle alone. Even the biggest companies with the most advanced technical and human resources still get breached. Cybersecurity is no longer a human-scale problem. AI is a fundamental tool to lower the barrier of entry for cyber defense, democratizing security and making it more accessible for companies. Security teams must rely on advanced cybersecurity tools like AI to instantly identify anomalous behavior indicative of cyber-threats across all these ecosystems and halt it before evolving into full-scale attacks.
Q3. What can customers expect to see and hear from Darktrace at Black Hat USA 2022?
Powered by Self-Learning AI, Darktrace’s new product family, “PREVENT,” delivers total visibility into digital assets, eliminates blind spots, identifies areas of vulnerability, and continuously hardens defenses to minimize cyber risk for organizations. This end-to-end solution provides continuous AI-driven insights, testing critical attack pathways and shoring up defenses to prevent attackers from reaching an organization’s most vital systems and data, or “crown jewels.”
PREVENT identifies and fortifies areas of high risk both internally and externally, making it possible to anticipate and avert attacks. PREVENT enables CISOs to prioritize vulnerabilities and strengthen defenses autonomously by feeding into Darktrace’s existing DETECT and RESPOND product families. This proactive approach to cybersecurity finally gives the upper hand to defenders over malicious actors.
As digital transformation leads to more complex, hybrid IT infrastructures with assets increasingly hosted by cloud providers and organizations more reliant on third-party vendors in the post-COVID era, attack surface management has become more challenging. Red team security testing is typically conducted by a highly skilled, small group of individuals to simulate cyber-attacks. It’s a costly process, limited in scope, and typically conducted twice annually with imperfect results. In the case of penetration testing, it often leaves security teams with a mountain of information to work through.
Darktrace PREVENT for Attack Surface Management (PREVENT/ASM) continuously monitors an organization’s external attack surface, assessing all assets for high-impact vulnerabilities and external threats. Understanding ASM can help organizations avoid these threats and proactively manage risk.
PREVENT is a core component of Darktrace’s Cyber AI ‘Loop’, which orchestrates dynamically related capabilities that function continuously by preventing, detecting, responding, and healing from cyber disruption. HEAL is the final component of the Darktrace vision, creating a system that can leverage learnings from across the other product families to return your organization to a normal state after an attack.