IronNet has updated its IronDefense network detection and response (NDR) solution to help security operations center (SOC) analysts address cyber threats that "have slipped past endpoint and firewall detection," according to a prepared statement.
What IronDefense Offers SOC Analysts
SOC analysts now can use IronDefense to detect password spray, suspicious login times and other signs of virtual private network (VPN) abuse, IronNet said. In addition, they can detect fixed-interval and randomized-timing beacon activity and other advanced cybercrime techniques and patterns.
Furthermore, IronDefense features new sensors that can be auto-commissioned and auto-upgraded, IronNet noted. IronDefense also enables SOC analysts using SentinelOne endpoint detection and response (EDR) capabilities to create and update their network inventory and isolate a device in a SentinelOne-deployed network.
Along with updating IronDefense, IronNet has received a $2 million loan from an affiliated fund of existing stockholder C5 Capital Limited. The loan has an annual interest rate of 13.8% and a maturity date of June 30, 2023.
IronNet Launches IronRadar Threat Intelligence Feed, Joins Space Information Sharing and Analysis Center
The IronDefense updates come after IronNet in November 2022 released IronRadar, a threat intelligence feed that lets security teams "detect and block malicious indicators of adversary infrastructure as they are being set up," the company said. With IronRadar, security teams can view Internet fingerprinting servers to determine if they are command and control (C2) infrastructure before a cyberattack begins.
Previously, IronNet in October 2022 became a member of the Space Information Sharing and Analysis Center (ISAC). As such, IronNet helps the global space community identify and respond to threats and mitigate risks to international space missions, the company indicated.
IronNet leverages a "Collective Defense" approach to help global organizations protect against cyberattacks, the company said. It offers a partner program that allows MSSPs, MSPs and other technology providers to incorporate its Collective Defense platform and other cybersecurity tools into their portfolios.