About ITrust

This author has not yet filled in any details.
So far ITrust has created 87 blog entries.

What is a managed EDR or MDR?

Having a managed EDR or MDR is more important than ever today. Here is some useful information to help you in your project to implement a managed EDR. What is an EDR solution? Endpoint Detection Response (EDR) is a set of cybersecurity tools designed to detect and remove any malware or other malicious activity directed against the endpoints connected to your corporate network. Indeed, endpoints and workstations are a prime target for cyberattacks as they are the weakest link in a company's network. As an example, the WannaCry attack exposed the vulnerability of 230,000 endpoints [...]

By |2022-08-22T10:28:53+02:00August 22nd, 2022|Non classé|

XDR: The solution to block all attacks

Today's IT security teams must manage data from a large and increasingly complex network that spans multiple clouds and software-as-a-service (SaaS) applications, a growing number of sites with new SD-WAN connections, connected objects (IoT), OT systems, workers and mobile devices, and now dozens or even hundreds of home offices. XDR, a necessary technology today To keep up with the volume, velocity and variety of data, Extended Detection and Response (XDR) technologies are needed to collect and process security data at scale in hybrid IT environments. SIEM has been doing this for many years, but marketers [...]

By |2022-09-23T17:41:44+02:00August 5th, 2022|Non classé|

Use Case for AI in Cybersecurity : the DGA algorithm

Since 2018 and the release of the 1st version of Reveelium, the team at ITrust is convinced of the value of Artificial Intelligence for cybersecurity. In recent years, market trends have proven us right: from SMEs to industry giants, all rely on this technology to increase their ability to detect threats tenfold. But what do we mean by AI? Reveelium is not yet able to think like a human, and therefore does not replace the expertise of an accomplished SOC analyst. That being said, the practice of AI at ITrust goes far beyond the IF/THEN rules, even optimized, that have [...]

By |2022-01-03T15:07:56+01:00January 3rd, 2022|Non classé|

Feedback Session : Kryptis Malware Detection

The Kryptis malware recently attempted to spread through the infrastructure of one of our customers, a SME-sized company, operating in the legal sector. Countered by our teams, this threat followed the attack patterns of modern malwares,which are difficult Difficult to detect with traditional tools, this customer case highlights the weaknesses of perimeter defense logics. In this post we explain, in a pedagogical way, how we were able to block this cyber attack by exploiting the triptych: SIEM UEBA / Threat Intelligence / Human Expertise. The Kryptis malware The Reveelium UEBA SIEM started by detecting attempts to access the Dark Web, [...]

By |2021-10-25T10:35:28+02:00October 22nd, 2021|Non classé|

THE SOC REVEELIUM OBTAINS THE U.A.F. LABEL

THE SOC REVEELIUM OBTAINS THE U.A.F. LABEL ITrust has obtained the UAF (Used by French Military) label, granted to our Reveelium technology, integrated into our SOC. This label, awarded by the French Ministry of the Army, is the result of several years of collaboration in the protection of vital national organizations. This recognition reinforces ITrust's position as a reference in the market of AI-enhanced sovereign cybersecurity solutions. (SIEM UEBA, XDR, Scanner and EDR) "The Reveelium SOC is the first SOC to receive the UAF label. Three French ministries are now secured by the SOC Reveelium, in order to fight against [...]

By |2022-09-27T17:17:34+02:00October 7th, 2021|Non classé|

The recipe of a good SIEM for a good SOC?

How does Reveelium UEBA / TreatHunting SIEM work? The principles that govern the operation of SIEM (Security Information Event Management) tools have been well known for years. The arrival of artificial intelligence for cybersecurity tools is less well known. We try to explain it simply here, despite the important technical knowledge usually necessary to fully understand the functioning of very innovative AI technologies.   The logical building blocks : A SIM: Security information management: it centralizes and aggregates logs from applications, equipment, security tools (FW, antivirus, proxies, etc...). An advanced SIM can generate some alerts based on (simple) search criteria [...]

By |2021-10-07T15:58:25+02:00October 7th, 2021|Non classé|

Who is the winner? The MITRE Matrix-based ranking of the best cyberprotection technologies

Above : Feedback from the field CIOs, CISOs or managers often ask us what the best practices are to apply to protect themselves effectively and quickly. The first answer I give them is to identify the risks and to set up a simple organization (CISO, DPO, PSSI) adapted to the structure's functioning. Within ITrust for 14 years, we have had the time to form an opinion on the best practices, correlating them to those identified by the ANSSI or ENISA or SANS. We have some convictions and we wanted to confirm them with a mini study based on independent recognized [...]

By |2021-10-07T16:21:12+02:00October 7th, 2021|Non classé|

Our commitment

I would like to share our commitment with you. Who are the entrepreneurs / managers that validate these statements? In these troubled times I asked the #Itrust teams: - to support companies in difficulty even if they lack budget (Free COVID Kit for all) - to participate in the effort to fight the #covid - to try to maintain R&D investments within the group as much as possible (more than 65% of the company's expenses) - to maintain our activities and services at 100%, for our clients - to honour all invoices from our supplier partners on time - to [...]

By |2020-10-30T16:23:16+01:00October 30th, 2020|Non classé|

“Cyber” essential safety precautions

Beyond the safety precautions that we know well and that we accomplish daily  to protect each other’s health, there are some that concern the health of our... companies! I will try to answer many of these companies’ current questions, with factual data, generated from the 350 clients of the company I manage, which specializes in cyber security: ITrust. With data “from the field”.This opinion column may seem naive, but it's sole ambition is mainly to be pedagogical. The unprecedented and brutal economic and social situation, which could be described as tense, to say the least, has created a new risk, [...]

By |2022-09-19T17:41:43+02:00October 4th, 2020|Non classé|
Go to Top