WEBINAR | From Deal to Defense: Unifying Cybersecurity Post-M&A
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Find cyber threats that have evaded your defenses.
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Brands of the world trust ReliaQuest to achieve their security goals.
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
The latest white papers focused on security operations strategy, technology & insight.
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
February 20, 2024
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
Endpoint Detection and Response (EDR) solutions have been helping SOC teams sleep better at night for a good decade now. As the sequel of traditional antivirus and host-based intrusion detection systems (HIDS), EDR has proved more effective, warding off skilled cyber-threat actors by analyzing behavior. But like any security solution, it can become the weakest link in a cybersecurity system if not adequately set up, distributed, addressed, and controlled.
Without proper EDR implementation, cyber attackers can cripple protective measures, de-register EDR agents or sensors, and make up their own malicious exceptions that give them free rein to wreak havoc in your environment. To rest assured that your EDR solution is living up to its full potential, get to know the best practices of implementation.
Start by entering your exceptions in the EDR product’s console. Set a deadline for collating all authorized applications (although you should always maintain a regularly updated asset list, with an initial focus on the network edge).
Think about how broad each exception would be. Is an application identified as authorized but not recognized as authorized by the EDR product? An exception would allow it to run while in block mode. But if you make the exception too broad, you can create a blind spot and invite undue risk.
We’ve seen multiple cases of EDR products failing to prevent malware executing on systems that had overly broad exceptions in place.
Sleep aid: Establish tightly defined exceptions; for example, in the scenario described above, you’d identify the application’s absolute file path, filename, and, ideally, file hash.
Next, devote careful planning to the EDR deployment stage, across the entire organization. Without thorough implementation of your EDR product, you’ve already set the stage for security teams to fail in response to an intrusion. (We recently wrote about better preparing incident response teams.)
You may decide to tread lightly in choosing defensive options, choosing detect (passive) mode over protect (block) mode at a basic functioning level. As a reminder:
Passive mode lets you ensure that business operations and custom applications don’t react in problematic ways. But we’ve seen firsthand how a continued passive state leaves the door open for attackers to execute their own applications without restrictions—in small- or large-scale intrusions.
Sleep aid: Switch to block mode once you’ve assessed the risk and are convinced that business-critical systems are unaffected by the EDR product.
The automated remediation feature of an EDR product is often available in standard and customized versions, and can be invaluable in responding to malicious activity, files, or applications. If certain circumstances or criteria are met, the auto-remediation kicks into action, deleting suspicious files and applications from the device. (See also more insights about automation.)
But clear alert, incident, and event escalation paths must be established at an early stage of EDR setup. They should assign specific parties to specific actions, and may even call for playbooks or escalation paths that lead to broader actions or policy changes.
Sleep aid: Define clear paths, and maintain them, to greatly decrease the potential dwell time of an attacker and achieve better response outcomes.
Bonus Best Practice: Patching
Once your EDR product is in place and operational, maintenance is required for it to remain a robust EDR solution: Use update settings (which often vary according to the policies applied to them) to test the most recent versions before you distribute throughout the organization. Then practice regular patching. Any outdated versions of an EDR product or its sensor won’t have the latest detection capabilities, and your endpoints may be left exposed to bypasses allowed by older versions.
Controlling which personnel have access to the EDR product is another critical step that should occur during setup—especially as most EDR solutions are now cloud based. Access control safeguards the product against unnecessary exposure and lessens the impact if account credentials are lost, stolen, or phished.
Sleep aid: Most EDR solutions allow various levels of privilege for specific users’ roles; take advantage by carefully ensuring the right people have the right level of permission at the right time:
To save time, costs, and potential reputational damage, ensure diligence in carefully setting up EDR. ReliaQuest GreyMatter helps get the most out of your EDR solution and improve your security operations workflow, enabling you to improve visibility, reduce complexity, and better manage risk—so you can rest easier at the end of the day.
Get a live demo of our security operations platform, GreyMatter, and learn how you can improve visibility, reduce complexity, and manage risk in your organization.