CI Security’s new Microsoft Defender ATP integration helps round out the company’s 24/7 detection and response offering, Critical Insight MDR. The combination enables complete visibility into customers’ environments, whether a physical network, cloud environment, zero-trust workforce, or any combination of the above.
“With remote working now the normal for many organizations, information security teams are scrambling to secure this rapidly expanding remote workforce. Employees are accessing sensitive data from all over the globe, causing an increased focus on zero trust architecture and, ultimately, the endpoint,” said Mike Hamilton, co-founder and CISO of CI Security.
“As we continue outfitting our offering with best-of-breed technology and services, CI Security is laying a foundation for enabling the mid-market to plug and play a cybersecurity team to up-level their existing resources.”
CI Security’s new Microsoft Defender ATP integration will allow the company to monitor events and alerts from Microsoft Defender ATP using analyst-driven hunting and investigation activities, as well as proactively push tickets to analysts for investigation using CI Security’s specifically designed detections.
Through this integration, CI Security analysts can now actively isolate machines based on playbooks developed with each customer. This feature is part of the Critical Insight Rapid Quarantine (CIRQ) offering.
“Increasingly, customers are asking for more services as they advance along their security journeys,” said Garrett Silver, CEO of CI Security.
“They are asking for MDR and EDR to handle their daily monitoring, and at the same time, asking for security assessments and penetration tests to improve their programs. We are here to provide the range of services our customers need, which is why we created the integration with Microsoft Defender ATP.”
CI Security chose Microsoft Defender ATP because it has quickly attained significant market share while demonstrating exceptional execution. CI Security’s own offensive security team reports it’s one of the most difficult endpoint protection solutions to evade.