Elastic Archives — 躂圖AV /category/elastic/ Powerful solutions for a complex world Wed, 28 Feb 2024 11:54:22 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 /wp-content/uploads/2019/03/Red-Mark-600px@2x-100x100.png Elastic Archives — 躂圖AV /category/elastic/ 32 32 Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard /ecs-insight/blog/enabling-operational-visibility-and-reducing-federal-cyber-risk-with-elastic-and-the-cdm-dashboard/ Wed, 28 Feb 2024 11:00:44 +0000 http://ecstech.flywheelstaging.com/?p=23062 Joanna Dempsey, vice president of CISA portfolio, and Keith McCloskey, vice president of Justice & Homeland Solutions, break down how the CDM dashboard ecosystem, powered by Elastic, empowers federal threat hunters like never before.

The post Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard appeared first on 躂圖AV.

]]>
By Vice President, CISA Portfolio
and Vice President, Justice & Homeland Solutions, CTO

[This article complements a talk given by Joanna Dempsey, vice president of CISA portfolio at 躂圖AV, at ElasticON 2023. to view Joannas full presentation on YouTube.]

For the past three years, 躂圖AV has been working with the Cybersecurity and Infrastructure Security Agency (CISA) Continuous Diagnostics and Mitigation (CDM) program to build, deploy, and operationalize a whole new CDM dashboard ecosystem. Our goal has been realizing actionable operational visibility for federal agencies an unprecedented level of visibility and access to cyber data, at scale. The CDM Dashboard ecosystem improves how incident responders find and remediate threats and vulnerabilities, enabling agencies to better protect their assets.

To achieve this, weve partnered with Elastic, whose suite of open-source products enables real-time search, analysis, and visualization of data regardless of format. And while the original CDM mission to help federal agencies protect their networks remains strong, the CDM dashboards, built on Elastic, are enabling a game-changing level of visibility and insight. After exploring how, well look at a scenario illustrating how operational visibility in the federal government could greatly improve our nations cybersecurity.

The First Steps Towards Operational Visibility

First, we must recognize the impact of the 2021 Executive Order on cybersecurity, which did three critical things:

  • Removed many of the governments barriers for interagency data sharing.
  • Directed the improved collection and analysis of additional cyber-relevant data.
  • Prescribed a government-wide endpoint detection and response (EDR) capability, which has become a top priority for CDM.

This evolution of federal cyber requirements cleared a path for more effective collaboration across the federal civilian executive branch (FCEB) agencies a new direction that aligned perfectly with platforms like Elastic and the CDM dashboards.

The CDM Agency Dashboard is the first point at which all these vast data sets are aggregated so that we can efficiently scale federal cyber operations.

Starting at the bottom of this chart, we have a diverse and dynamic set of agency tools and sensors that satisfy a range of requirements for effective cyber hygiene on agency networks. Moving up a layer, the data from these tools and sensors is integrated and aligned to a common schema so that we can make sense of it at scale.

CDM and Operational Visibility

CISAs operational visibility strategy has two components:

  • Providing improved, contextualized visibility into an organizations mission.
  • Providing deeper insights into the risk posture of an organization and its assets.

The strategys goal is to connect people with the right contextualized and enriched data to help them make better decisions and reduce cyber risk. In the agencys view, the question operational visibility seeks to answer is:

How do we integrate the people, processes, and tools we need to automate the detection and remediation of the known, predict the known unknowns, and adapt to the unknown unknowns?

Lets focus on two key initiatives within CDM that enable CISAs operational visibility strategy: the government-wide deployment of EDR capabilities and a Host Logging Visibility pilot. The former has become a critical part of federal cyber programs, as EDR tools are generally very good at automating the detection and remediation of known bad things happening on an endpoint. The latter expands the data available to agency and CISA analysts in the CDM dashboard to include endpoint logs data which can be correlated at scale and with other CISA intelligence to improve threat detection and analysis.

Operational Visibility in Action

Now, lets walk through exactly how the CDM dashboards can help orchestrate an improved defense of agency networks.

Pretend youre a CISA cyber analyst tracking a particularly bad threat actor, Bad Baby Dingo, operating out of Australia. You receive intelligence that Bad Baby Dingo is targeting a common vulnerability and exposure (CVE) to launch a rare process that installs a malicious file on victims systems.

The process to install the file, which well call Creepy Koala, leaves behind clues specifically, logs that describe the process being launched and the file being installed. These process logs are captured on the endpoint and sent to the CDM dashboard for analysis and monitoring.

You log in to the CDM federal dashboard and run a search across the entire FCEB for the CVE that Bad Baby Dingo is exploiting. You get over 12,000 hits spread across 14 agencies, which would require a huge amount of labor to comb over. However, with the dashboard, you simply isolate the assets with the CVE, gaining insights into potential high value assets (HVAs) that could be impacted. Using this list as your input for another query, you identify potential indicators that the Creepy Koala process has been run. This time, your search leads you to 18 devices split between just two agencies, with HVA context to help inform and prioritize your response.

At this point, you have evidence that Bad Baby Dingo has breached two federal networks with an identified and prioritized set of assets. You pivot to agency As EDR console and isolate 10 of the impacted devices. You dive deeper into the systems to confirm what you suspected a Creepy Koala process has been run on the endpoints. You help the agency security operations center (SOC) prioritize their response to block the process, remove the bad files, and create rules within the EDR to block the process in the future. You work with your peers across CISA to distribute alerts and detection rules to all agencies. You now have what you need to render Creepy Koala effectively harmless against the entire federal government.

躂圖AV + Elastic Deliver

Ultimately, Elastic-powered CDM dashboards empower incident responders like never before. With a broader and more enriched set of cyber-relevant data, coupled with a more unified approach to how we consume, manage, and analyze that data, our nations defenders can stop reacting to the problem and start being more proactive in defending their missions.

Interested in learning about our CDM Program?

Reach out and talk to our experts today!

The post Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard appeared first on 躂圖AV.

]]>
Optimizing SecOps with Elastic /ecs-insight/blog/optimizing-secops-with-elastic/ Tue, 27 Feb 2024 05:01:06 +0000 http://ecstech.flywheelstaging.com/?p=23693 Dave Howard, director of the Cyber Threat Analysis Center at 躂圖AV, and Luke Gigiano, cyber threat analyst, explore how our analysts employ many of 楚梭硃莽喧勳釵s key capabilities to optimize our Security Operations.

The post Optimizing SecOps with Elastic appeared first on 躂圖AV.

]]>
Go to video

The ever-evolving threat landscape requires cybersecurity analysts to detect, analyze, and respond to threats quickly, accurately, and at scale. At 躂圖AV, the Cyber Threat Analysis Center (CTAC), our premier threat analysis and advanced analytics capability, serves as the tip of the spear in threat monitoring, analysis, detection, and response.

Critical to providing powerful solutions to our customers are our partnerships with emergent security technologies such as Elastic, the leading platform for search-powered solutions. We leverage Elastic security information, event management, and analytics solutions to outpace adversaries, operate at scale, and act decisively. 躂圖AV has more Elastic-certified engineers than any other organization (aside from Elastic itself), and we manage one of the worlds largest Elastic environments.

The post Optimizing SecOps with Elastic appeared first on 躂圖AV.

]]>
躂圖AV Wins 2022 Elastic Excellence Award, Security Category /ecs-insight/press-release/ecs-wins-2022-elastic-excellence-award-security-category/ Wed, 29 Mar 2023 12:09:01 +0000 http://ecstech.flywheelstaging.com/?p=23118 躂圖AV has won an Elastic Excellence Award for developing a solution that detects, analyzes, and responds to advanced threats targeting customer environments.

The post 躂圖AV Wins 2022 Elastic Excellence Award, Security Category appeared first on 躂圖AV.

]]>

FAIRFAX, Va. March 29, 2023 躂圖AV, a leader in advanced technology, science, and digital transformation solutions, has won a 2022 Excellence Award from , the leading platform for search-powered solutions. recognize partners and customers for demonstrating ingenuity and resilience by pushing the limits of data search, observability, and security with groundbreaking implementations of its Security, Observability, and Enterprise Search solutions.

With this business transformation award in the Security category, Elastic recognized 躂圖AV for its novel methodology in reducing alert volume through customized Elastic tuning. The winning 躂圖AV solution incorporated threat hunting, machine learning, and saved searches to detect, analyze, and respond to advanced threats targeting customer environments.

A global Elastic partner, 躂圖AV has deep experience delivering Elastic Security across all verticals and organizational sizes and manages one of the worlds largest Elastic deployments. 躂圖AV uses 楚梭硃莽喧勳釵s security and observability technology for endpoint security, search, visualization/dashboarding, log analysis, observability, security analytics/SIEM, and data mining.

Were thrilled to receive this Elastic Excellence Award, said John Heneghan, president of 躂圖AV. Time and time again, our partnership with Elastic brings the right mix of talent and technology to bear on customer challenges and the result is customer success. Were honored to receive an award for our use of Elastic and thankful to have such a powerful technology at our disposal.

John Heneghan, President of 躂圖AV

Receiving an Elastic Excellence Award is a testament to our industry-leading engineers, analysts, and project management professionals who develop innovative solutions to solve tough problems, said Andy Woods, vice president of enterprise managed services at 躂圖AV.

Andy Woods, Vice President of Enterprise Managed Services at 躂圖AV

About 躂圖AV
躂圖AV, ASGNs federal government segment, delivers advanced solutions in cloud, cybersecurity, data and artificial intelligence (AI), application and IT modernization, science, and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence, and commercial industries. 躂圖AV maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, 躂圖AV has more than 3,800 employees throughout the United States. For more information, visit 躂圖AVtech.com.

About ASGN Incorporated
ASGN Incorporated (NYSE: ASGN) is a leading provider of IT services and professional solutions, including technology, creative, and digital, across the commercial and government sectors. ASGN helps leading corporate enterprises and government organizations develop, implement, and operate critical IT and business solutions through its integrated offering of professional staffing and IT solutions. For more information, visit us at .

Contact
Andy Woods, VP of Enterprise Managed Services
(703) 270-1540
andy.woods@ecstech.com

The post 躂圖AV Wins 2022 Elastic Excellence Award, Security Category appeared first on 躂圖AV.

]]>
CDM Dashboards Empower Threat Hunting, Require Smarter Approach to Data /ecs-insight/blog/cdm-dashboards-empower-threat-hunting-require-smarter-approach-to-data/ Thu, 02 Feb 2023 12:00:48 +0000 http://ecstech.flywheelstaging.com/?p=15826 The CDM dashboards empowers federal agencies to track and act against cyber threats in time to make a difference.

The post CDM Dashboards Empower Threat Hunting, Require Smarter Approach to Data appeared first on 躂圖AV.

]]>
By
Director, Cyber Solutions
and
RVP of Cyber Solutions, Elastic

As we have seen with security breaches in recent years including the SolarWinds attack it can be challenging for federal security leaders to effectively detect cyber threats across their networks. In the last few decades, private-sector organizations have established tools to help monitor for malicious activity, but until recently, the federal government hasnt had one centralized method.

The Continuous Diagnostics and Mitigation (CDM) program standardizes how civilian agencies monitor their networks for cyber threats while improving their cybersecurity postures. The program operates under the direction of the Cybersecurity and Infrastructure Security Agency (CISA).

Through this centralized strategy, the CDM dashboard empowers an ideal threat-hunting environment for cybersecurity professionals to identify threats before they strike. DHS is leading the way in exploring advanced endpoint detection and response technologies available to the agency personnel that need them.

The May 2021 release of the Executive Order on Improving the Nations Cybersecurity greatly accelerated these efforts. The order requires agencies to deploy an endpoint detection and response (EDR) capability. CISA is tasked with leading the Federal EDR deployment initiative to support host-level visibility, attribution, and response regarding Federal Civilian Executive Branch (FCEB) information systems at scale. The order also mandates the authorization of much-anticipated changes to the agreements between FCEB agencies and DHS, which now require agencies to share detailed information about their systems through the CDM program.

For the first time, the CDM program now has both the technical ability to hunt for threats at scale and policy authorizing it to do so.
Heres how federal cyber professionals can leverage these updates and make the most out of the CDM program:

Standardization Makes it Possible to Hunt at Scale

Until now, the lack of normalized data formats has contributed to poor data quality and made it challenging to identify potential vulnerabilities at scale. Open technology tools and common schema specifications hold the power to unlock previously disparate data.

The CDM dashboard maximizes common schema tools. Increased support for the dashboard means data from various sources, locations, and formats can be more quickly synced and analyzed.

Under the Chief Financial Officers (CFO) Act, there are 23 agency-specific dashboards that feed into the wide-spanning federal CDM dashboard, as well as data from more than 70 non-CFO Act agencies. CISA Analysts can query all of the Agency dashboards at once, to identify the prevalence of vulnerabilities and at-risk systems across the entire FCEB. As even more agencies adopt the centralized CDM dashboard, the amount of valuable intelligence will continue to grow, delivering the comprehensive government-wide threat visibility required to combat increasingly sophisticated cybercriminals.

Finding Hidden Threats Quickly Depends on Data

Successful threat hunting begins with having the right data to answer the right questions at the right time. Without that data, there is no hunt. Why? Because dwell time the time between when a compromise first occurs and when it is detected is on the rise.

Sophisticated state-sponsored threat actors can remain undetected for months; foreign adversaries average dwell time is 10-plus days, and in the SolarWinds case we saw dwell times of 300-plus days. The only way to accurately analyze these long dwell times is to retain telemetry for longer periods of time so that historical analysis can be performed.

Data consolidation opens up more insights that can be gathered quickly and cost effectively. While this is good for threat hunters the more data you have, the more effective your threat hunting process will be it can easily overwhelm agency systems with its sheer volume and velocity. Further, some degree of data normalization is necessary to enable automated detection at scale and to help analysts find what theyre looking for. The CDM dashboard provides a model for government-wide data normalization and helps analysts search through mountains of data fast. More data means determining where a breach occurred, what it impacted, and how it might be related to other events.

From Reactive to Proactive Cybersecurity

Agencies need an offensive mindset in todays security environment and must always assume theyre at risk of being compromised. Its in this zero-trust world where threat hunters can play a critical role. They understand where and how to look for security threats and can analyze the trends the CDM dashboard generates. Threat hunters are prepared to fight the network to eradicate adversaries from within ever-expanding agency perimeters.

Its not a matter of if, but when the next cyberattack occurs. When we started writing this article, the Microsoft Exchange breach Hafnium was discovered; by the time this article is published, the next big breach or several big breaches will have already taken place.

With a more unified approach to how we consume, manage, and analyze data, the nations defenders can stop observing the problem and start playing offense, making CDMs government-wide vision of proactive security a reality of our cyber defense.

The effort has gained significant support from policymakers as well. Last year, the National Defense Authorization Act (NDAA) gave CISA the ability to collect data from federal agency networks and proactively hunt for vulnerabilities without notifying the individual agencies. The Executive Order on Improving the Nations Cybersecurity contains dozens of new and enhanced provisions which provide CISA with the authority to make a significant impact. In order to maintain transparency across government, DHS will be required to report the findings of this proactive threat hunting to Congress. With the CDM dashboard, this information is easily shareable, but adhering to the NDAA while continuing to increase threat hunting efforts requires agencies to change the way data is stored, accessed, and analyzed.

In its continuous evolution, more features will be added to the CDM dashboard during the governments next fiscal year. Updated capabilities are already being piloted at a handful of smaller agencies to measure potential impact. These enhancements include a CDM-enabled threat hunting capability, which pulls log data into the agency dashboard and enables queries across agencies from the federal dashboard to proactively search for threat activity. Generating deeper insights from across the government to alert threat hunters is a giant step forward, and the CDM dashboards can enable this identifying threats in time to make a difference.

Interested in learning about our CDM Program?

Reach out and talk to an expert today.

The post CDM Dashboards Empower Threat Hunting, Require Smarter Approach to Data appeared first on 躂圖AV.

]]>
Partnering With A Next-Gen MSP /ecs-insight/blog/partnering-with-a-next-gen-msp/ Thu, 07 Jul 2022 13:07:39 +0000 http://ecstech.flywheelstaging.com/?p=19279 躂圖AV is a next-generation MSP, providing a range of services to create an end-to-end experience.

The post Partnering With A Next-Gen MSP appeared first on 躂圖AV.

]]>

Enter the next-generation managed service provider (MSP): providers who not only deliver innovative solutions but who link solutions from different areas to create an end-to-end service model.

In recent years, tech and data-oriented industries have shifted away from insourced solutions towards MSPs. However, while MSPs represent a cost-effective way to access critical IT capabilities and applications, rarely does one MSP cover all aspects of an enterprise’s technology suite.

One area where partnering with a next-gen MSP can reduce this operational redundancy is cloud services. There are many MSPs who can provide access to basic cloud services, but partnering with a next-gen MSP goes beyond digitizing workflows or decentralizing business operations it empowers an enterprise to streamline and transform its whole operation.

Next-Gen Means End-to-End Service

Partnering with a next-gen MSP means getting end-to-end service. An end-to-end cloud service provider leverages the cloud to increase operational flexibility and link disparate solutions, improving the whole enterprise. Such solutions can vary as widely as:

Asset Management
Open-source Search & Analysis
DevSecOps
AI/ML
Zero Trust Architecture

Gaining access to the scalability and ease of use of the cloud can have a major impact on an enterprises bottom line. However, gaining access to a range of cloud-enabled solutions that touch every aspect of an operation can be nothing short of transformative.

Connecting the Dots

As a leading provider of cloud managed services, including the Audited Amazon Web Services (AWS) MSP program competency, 躂圖AV helps customers build cloud initiatives from scratch, guides them through the adoption and implementation process, and provides ongoing support. With over 1,000 cloud certifications, accreditations, and awards to our name, we accelerate cloud adoption while maintaining business continuity, minimizing risk, and enhancing performance.

Want to learn more about how 躂圖AV can help you transform your operation?

CONTACT OUR EXPERTS

The post Partnering With A Next-Gen MSP appeared first on 躂圖AV.

]]>
Join 躂圖AV at Elastic{ON} Gov Summit /ecs-insight/events/join-ecs-at-elasticon-gov-summit/ Wed, 02 Oct 2019 13:52:02 +0000 http://ecstech.flywheelstaging.com/?p=10853 躂圖AV is a pleased to announce our attendance and sponsorship of the Elastic{ON} Gov Summit. Stop by our booth for useful content and expert advice on Elasticsearch and the Elastic Stack.

The post Join 躂圖AV at Elastic{ON} Gov Summit appeared first on 躂圖AV.

]]>

躂圖AV, a leading technology solutions provider and a Regional and Channel Partner of Elastic, is pleased to be a sponsor at the Elastic{ON} Gov Summit. Join us on October 15, 2019 at the Marriott Marquis Washington D.C. from 7:30 a.m. to 4 p.m.

The Elastic{ON} Gov Summit presents useful content and advice to help organizations in the public sector succeed with Elasticsearch and the Elastic Stack. This free event welcomes global leaders from government, education, and non-profits.

“We are thrilled to participate in Elastic{ON} both as a sponsor and exhibitor, discussing our experience and capabilities migrating customer workloads from legacy platforms to Elastic, said Michael Zakrzewski, Elastic team lead. We believe in the power of Elastic, and weve had great success integrating it with our current and new customers existing systems.

Visit 躂圖AV at the summit to discuss how your organization can unlock critical mission intelligence while improving performance, enhancing security, and increasing cost savings.

The post Join 躂圖AV at Elastic{ON} Gov Summit appeared first on 躂圖AV.

]]>
躂圖AV Announces Partnership withReal-Time Search CompanyElastic /ecs-insight/press-release/ecs-announces-partnership-with-real-time-search-company-elastic/ Wed, 09 Jan 2019 15:41:56 +0000 http://ecstech.flywheelstaging.com/?p=8001 The post 躂圖AV Announces Partnership withReal-Time Search CompanyElastic appeared first on 躂圖AV.

]]>

FAIRFAX, Va. – January9, 2019 –, a leading provider of advanced technology, science, and engineering solutions is proud to announce a泭滄勳喧堯泭, a search company and the creators of the Elastic Stacka group of open source products designed to help users take data from any type of source making it useable in real time and at scale.

楚梭硃莽喧勳釵s suite of self-managed and SaaS offerings enables real-time search, logging, security, analytics, and visualization of data regardless of format. 躂圖AV will leverage Elastic technology to enhance the security, reliability, and speed of its big data solutions. Elastic Stacks powerful features include log analytics, full-text search, dynamic queries, data mining, and operational intelligence for structured and unstructured data. Coupled with a user-friendly interface, these capabilities help customers unlock the patterns buried in their data and assist in identifying critical mission intelligence. 躂圖AV Elastic solution will boost security (includingSIEM,security information, and event management),strengthen monitoring and reporting, and enable machine learning for customers across federal civilian, defense, and commercial sectors.

Given 躂圖AV early and continued adoption of machine learning,ourpartnership with Elastic is a natural fit,saidAaron Faulkner,vicepresident ofcybersecurityand manager of the 躂圖AV Cyber Center of Excellence. Our data scientists, cybersecurity analysts, and systems engineers are leveraging 楚梭硃莽喧勳釵s open-source technology in ways that change how our customers use and act on data.

“Elasticispowering the next generation ofcapabilities for search, monitoring, andanalysisacross virtually every vertical of government, defense, academia, industry, and critical infrastructure, saidGeorge Wilson, president of 躂圖AV.As our customers are seeking an ever-greater return on their investments, they have fully embraced open source technologies to deliver value, lower their cost of solutions, and chip away at decades of vendor lock-in.We are excited topartner with Elastic and contribute to the vibrant open source community.

About 躂圖AV
躂圖AV, a segment of ASGN, delivers advanced solutions and services in cloud, cybersecurity, artificial intelligence (AI), machine learning (ML), application and IT modernization, science,and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence and commercial industries. 躂圖AV maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, 躂圖AV has more than 2,400 employees throughout the U.S. and has been recognized as a Top Workplace byThe Washington Post病or the last five years. For more information, visit.

About ASGN
ASGN涅ncorporated (NYSE: ASGN) is one of the foremost providers of IT and professional services in the technology, digital, creative, healthcare technology, engineering, life sciences, and government sectors.涉SGN and its are眠iewed as best in class across multiple industries and疲ave畜uilt an outstanding reputation for excellence over the past 33 years.涉SGN is based in Calabasas, California, with multiple offices throughout the United States, Canada, and Europe. To learn more, visit .

Contact
Aaron Faulkner, Vice President, Cybersecurity
703-270-1540
Aaron.Faulkner@躂圖AVtech.com

The post 躂圖AV Announces Partnership withReal-Time Search CompanyElastic appeared first on 躂圖AV.

]]>