“In order for a modern SIEM to be trusted as the heart of an incident detection program, it needs to collect and centralize the right data, apply the right analytics, and explain why the output is meaningful,” says Rebekah Brown, Threat Intelligence Leader at Rapid7. “Technology is a great start, but security still requires a persistent focus on human adversaries. Attacker Behaviour Analytics allows our security analysts and threat intel teams to share what we are seeing on the frontlines automatically with all of our InsightIDR customers. Organisational blue teams don’t just want defence-in-depth, but expect agile detection engineering and guidance around adversary intent, capability, and opportunity. Now that our SOCs can directly contribute to InsightIDR, if we identify a novel attacker technique, we can push out a new detection to be automatically matched against customer data in hours.”
With the addition of ABA, all InsightIDR customers will automatically receive high-fidelity alerts on evolving attacker behaviours built from thousands of incident investigations, including the use of fileless malware, cryptojacking, and spear phishing. When these malicious techniques are identified, alerts highlight notable behaviour from the affected user and asset, making it significantly easier for security teams to respond quickly and with confidence.