Why is the 360-degrees security needed? Cybersecurity is a multi-disciplinary matter. Not just IT, nor just compliance or processes, nor just human behaviour, but a combination of these and other aspects. Each aspect is crucial and may pose a security risk to your company. Northwave 360-degrees security is an approach that considers all these aspects. Risk-based security ties these aspects together. To cover your security in a 360-degrees, risks are treated in an integrated manner in the areas of “Business”, “Behaviour” and “Bytes”.
AN INTEGRATION EXAMPLE BETWEEN “BUSINESS”, “BEHAVIOUR” AND “BYTES”
Considering the risk that phishing emails pose to your company, first, addressing the “Business”, Northwave could for example help your organization to define security & privacy policies, such as the policies regarding the use of email. Second, addressing the human “Behaviour”, Northwave could train your employees towards enforcing this policy, for instance, by training them how to react when an email with a URL is received or by performing a phishing campaign (in a controlled manner). Subsequently, from the “Bytes” perspective, Northwave uses both Business and Behaviour aspects and various technology components to implement, monitor and integrate prevention, detection and response. To make this integration possible, Northwave intelligently chose a technology stack. Here is where Microsoft has become an important partner.
CASE STUDY: 360-DEGREE SECURITY POWERED BY MICROSOFT.
Microsoft has a unique position to assist in 360-degrees security. Considering the example of phishing emails described before, the following Microsoft security products could be used to protect your business. Office365 ATP could be used to implement antiphishing policies (Business) and to monitor how employees react to phishing links (Behaviour). If this email led to a malware being installed, Microsoft Defender ATP could be used to detect it. If this email led to credential theft, Azure AD Identity Protection could be used. If this mailbox is non-Microsoft-related (e.g. Gmail), Cloud App Security could be used. Was this email accessed via cellphone? Then Microsoft Intune could be used. All data from these security tools and any other tool can be integrated and correlated with Azure Sentinel (Bytes), another Microsoft tool.