You are on page 1of 2

SOLUTION BRIEF

&

SOAR + EDR
Automate investigation, response, and threat hunting
across the VMware Carbon Black Cloud platform

Challenge
Overworked security operations teams, who are already drowning Joint Solution Benefits
in alerts and multiple disparate tools, must effectively bridge and
orchestrate cloud and on-prem security tools to effectively detect and
Slash Investigation Time and Effort
respond to threats at scale. Manual investigation and response activities
are nearly impossible to keep up with and are impediments to effective Run playbooks that automate data collection using VMware
threat detection and response. Carbon Black Cloud telemetry to limit the amount of time
spent manually cross-referencing information before
making decisions.
Automate Response and Enable Threat Hunting
Solution Overview Leverage the VMware Carbon Black Cloud API for
remediation actions such as isolating hosts or killing
processes with VMware Carbon Black Cloud Live
The right combination of SOAR and EDR is a dynamic duo for inundated
Response, without having to pivot between systems.
security teams. Siemplify and VMware Carbon Black have joined forces
to create a powerfully simple solution to reduce analyst workload by Unify Case Management
automating the ability to prevent, detect, hunt and respond to endpoint-
Ingest VMware Carbon Black Cloud alerts directly or via
based threats.
SIEM into the Siemplify Security Operations Platform.
Siemplify’s patented threat-centric technology
Siemplify integrates your VMware Carbon Black Cloud endpoint protection
automatically groups related alerts into threat-centric
platform telemetry with metadata from your other tools to efficiently
cases.
manage cases and automate response. Siemplify’s intelligent case
management groups alerts from your stack of tools and provides visibility
into the who, what, when, and where of a suspicious endpoint activity
without having to pivot between consoles. Playbooks are configured to
Joint Playbook Example
trigger automatic investigation and remediation of your most common
VMware Carbon Black Cloud alerts at machine speed. • Ingest alert from VMware Carbon Black Cloud Endpoint Standard

• Enrich the alert with endpoint and file metadata from the unified
binary store (UBS) in VMware Carbon Black Cloud Enterprise EDR

Product Integrations • Enrich the alert using third-party threat intelligence data

As a vendor-agnostic SOAR platform, Siemplify integrates with the • Automatically close the alert as a false positive if all enrichment
broadest range of the VMware Carbon Black Cloud platform. This data comes back negative
includes the latest offerings such as:
• Present the information to an analyst if a remediation sequence of
• VMware Carbon Black Cloud Endpoint Standard, actions needs to be executed

• VMware Carbon Black Cloud Enterprise EDR, and • Execute a series of VMware Carbon Black Cloud mitigation
activities such as a policy update, isolating a host, or quarantining
• VMware Carbon Black Cloud Live Response. a machine

• Note: Siemplify also integrates with legacy VMware Carbon Black • Activate VMware Carbon Black Cloud Live Response to hunt and
products such as CB Protect, CB Response, and CB Defense. kill a process based on the original process ID (PID)
SOLUTION BRIEF
&

Joint Use Case


Part 1: Integrate the VMware Carbon Black Part 2: Automate Response Actions and
Cloud Platform to Automate Investigation Enable Threat Hunting
This two-part use case effectively integrates four products in the VMware After the process of automatically investigating all details possible about the
Carbon Black Cloud endpoint protection platform to automate investigation file, device, and user, it’s time to respond and eliminate the threat. Playbooks
and response activities. These include the VMware Carbon Black Cloud can automatically close the case as a false positive, make a policy update, or
console, VMware Carbon Black Cloud Endpoint Standard, VMware Carbon engage the analyst for an approval to trigger remediation activities.
Black Cloud Enterprise EDR, and VMware Carbon Black Cloud Live Response.
A policy update action will control network communications from the host to
Siemplify’s cloud-native SOAR platform receives a behavioral-based alert restrict any movement of malware to other hosts across the environment.
created from a user’s abnormal activity detected by VMware Carbon Black As a next step, the playbook pauses to ask the analyst “Do you want to
Cloud Endpoint Standard. The detection is based on correlation with an quarantine the device?” If the analyst confirms, then that action is taken
Indicators of Compromise (IoCs) watchlist in the VMware Carbon Black Cloud. and the case can be automatically closed with notes added. Otherwise, the
Once an alert is received by Siemplify, it is placed within a threat-centric case case stage is automatically updated and integration with Carbon Black Live
that uses patented technology to group it with any related-entity alerts. Response is activated.

A playbook is then triggered and begins to enrich the case with device Live Response is a VMware Carbon Black product that allows a connection
information from the VMware Carbon Black Cloud console. The playbook then to the host to initiate a shell session via a sensor. This allows an analyst to
collects file metadata from a unified binary store (UBS) in VMware Carbon automatically hunt for and kill the malicious process identified in the original
Black Cloud Enterprise EDR. This allows an analyst to reference file metadata alert. This will kill the process ID (PID) without having to disrupt the host which
as well as determine if the host is a critical asset of interest. For an extra layer is a useful security operations technique. The net result is a successful,
of analysis, a third-party threat intelligence source is automatically called automatic elimination of a threat in rapid time and with much greater
after this file metadata is collected. accuracy.

About Siemplify About VMware Carbon Black

The Siemplify Security Operations Platform is an intuitive, holistic workbench VMware software powers the world’s complex digital infrastructure. The
that makes security operations smarter, more efficient and more effective. company’s cloud, app modernization, networking, security, and digital
Siemplify combines security orchestration, automation and response (SOAR) workspace offerings help customers deliver any application on any cloud across
with context-driven case management, investigation, and machine learning any device. Headquartered in Palo Alto, California, VMware is committed to
to make analysts more productive, security engineers more effective, and being a force for good, from its breakthrough technology innovations to its
managers more informed about SOC performance. global impact.
For more information, please visit https://www.vmware.com/company.html
Download the
Free Community Edition
Experience the Siemplify Platform with ready-to- Try it for free at:
siemplify.co/community
deploy use cases that leverage VMware Carbon Black. siemplify.co/partners/vmwarecarbonblack

siemplify.co © Copyright 2020 Siemplify

You might also like