Information Security Program Manager Serge believed endpoint detection and response (EDR) would provide the visibility they needed. “Being a cautious organization, we had taken a fairly traditional approach with our security up until then,” he remembers. “EDR had advanced dramatically over the last five or six years and I knew that it would help us move toward a multi-layered defense.”
Serge spent several months researching and evaluating vendors. He was impressed by the Carbon Black agent and the deep visibility it could provide for their laptops. However, they still needed a solution for their servers, as well as more resources for 24/7 monitoring and data review. They quickly saw that Red Canary could fill those gaps.
Serge says, “Carbon Black alone would have given us great visibility, but we wouldn’t have had SOC analysts in-house that we could call on for support. Red Canary provided so much extra benefit that it was worth it for us to get both.”
The team rolled out Red Canary with Carbon Black and replaced its traditional antivirus with a next-generation anti-malware solution. This multi-layered approach armed the team with best-of-breed antivirus as a first line of defense, backed by a layer of advanced detection and full incident response through Red Canary.
Serge worked with the institution’s network administrators to conduct a phased, two-week rollout and install the agents across the Windows laptops and servers. Everything went smoothly and standing up the portal required no effort or configuration.