Back in August, I talked to you about the next chapter for Fidelis, as we joined the General Dynamics family. Today, I want to talk to you about another significant milestone – the advent of our Network Defense and Forensic Services.
It’s no secret that the threat landscape has changed dramatically – as I mentioned in my last post, U.S. enterprises are now battling an enemy that the Federal Government has been combating for many years: nation states capable of waging advanced, customized, well thought-out attacks. And as our adversaries evolve, it’s important that, we, the soldiers on the front lines, do as well.
This new era and its required artillery is what led to our union with General Dynamics – and we are happy to now deliver Network Defense and Forensics Services through General Dynamics Fidelis Cybersecurity Solutions. The combined services help defend against attacks during every stage of the threat lifecycle and, if breached, quickly contain the threat, limit the damage and conduct remediation activities.
By combining products with services and people – those who really understand threats and those who really understand networks – we feel like we have gotten to the heart of advanced threat defense. For example, last week we published a Fidelis Threat Advisory about the Shamoon threat that was based on primary research done by our new combined team. Together we disclosed previously undiscovered information about how to investigate, remediate, and recover from Shamoon, and how to identify it as it propagates laterally over the internal network.
Our people are the driving force behind the Network Defense and Forensics Services, and I’m happy to introduce a voice you’ll be hearing from: Jim Jaeger, VP of Cybersecurity Services at General Dynamics Fidelis Cybersecurity Solutions. Jim is joining our geekdom on the blog and having handled several of the world’s largest commercial intrusions to-date, he will certainly have some interesting perspective, so stay tuned.
Apologies for once again taking the blog away from our primary focus on industry analysis and threat advisories. But with all this excitement in the air, I couldn’t just leave you hanging after August’s post, could I?