www.dynatrace.com Open in urlscan Pro
3.68.26.138  Public Scan

Submitted URL: https://em.dynatrace.ai/MzUyLU5WTy01NjIAAAGN222ID1O6cMvd62djmhj4AwFOkOKyOixdaAz-a_zzsdHW-YMywoNCyV9hWjCVGkLEqmpi_6Y=
Effective URL: https://www.dynatrace.com/news/blog/security-analytics-elevates-threat-detection-forensics-incident-response/?utm_medium=e...
Submission Tags: falconsandbox
Submission: On August 28 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="js-subscribe-form subscribe-form">
  <div class="subscribe-form-field js-subscribe-form-field-email">
    <label>
      <div class="subscribe-form-field__label">Enter your email</div> <input type="email" id="email" name="email" class="subscribe-form-field__text" "="">
        <div class=" subscribe-form-field__error js-subscribe-form-field-error-email">
  </div>
  </label>
  </div>
  <ul class="subscribe-form-field-group">
    <li class="subscribe-form-field">
      <label class="subscribe-form-field__radio-container">
        <input type="radio" name="subscriptionBlog" value="All updates" checked="">
        <span class="subscribe-form-field__label">All updates</span>
        <span class="checkmark"></span>
      </label>
    </li>
    <li class="subscribe-form-field">
      <label class="subscribe-form-field__radio-container">
        <input type="radio" name="subscriptionBlog" value="Blog posts">
        <span class="subscribe-form-field__label">Blog posts</span>
        <span class="checkmark"></span>
      </label>
    </li>
    <li class="subscribe-form-field">
      <label class="subscribe-form-field__radio-container">
        <input type="radio" name="subscriptionBlog" value="Product news">
        <span class="subscribe-form-field__label">Product news</span>
        <span class="checkmark"></span>
      </label>
    </li>
  </ul>
  <div class="subscribe-form-field">
    <button class="btn btn--tertiary js-subscribe-form-field-button">
      <span>Subscribe now</span>
      <span class="subscribe-form-field__button-spinner">
        <svg aria-hidden="true" focusable="false" data-prefix="far" data-icon="circle-notch" role="img" xmlns="https://www.w3.org/2000/svg" viewBox="0 0 512 512" class="svg-inline--fa fa-circle-notch fa-w-16 fa-5x">
          <path fill="#fff"
            d="M288 28.977v16.391c0 7.477 5.182 13.945 12.474 15.598C389.568 81.162 456 160.742 456 256c0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-95.244 66.422-174.837 155.526-195.034C218.818 59.313 224 52.845 224 45.368V28.981c0-10.141-9.322-17.76-19.246-15.675C91.959 37.004 7.373 137.345 8.004 257.332c.72 137.052 111.477 246.956 248.531 246.667C393.255 503.711 504 392.788 504 256c0-119.349-84.308-219.003-196.617-242.665C297.403 11.232 288 18.779 288 28.977z"
            class=""></path>
        </svg>
      </span>
    </button>
  </div>
</form>

Text Content

DYNATRACE UNVEILS SECURITY ANALYTICS TO ELEVATE THREAT DETECTION, FORENSICS, AND
INCIDENT RESPONSE

Published August 9, 2023 6 min read

Andreas Kroier

Amit Shah
Application security Product news


IN THIS BLOG POST

 1. 1.Extending application security protection to Security Analytics
 2. 2.Security Analytics and automation deal with unknown-unknowns
 3. 3.What can you do with Dynatrace Security Analytics?
 4. 4.What’s next for Security Analytics?
 5. 5.Leave the beaten path of traditional security tooling for a future with
    unified observability and security

Dynatrace Security Analytics, a new solution on the Dynatrace platform, enables
threat detection, forensics, and incident response using combined security and
observability context across the full stack. Security analysts accelerate
investigations with the Grail data lakehouse, executing lightning-fast queries
across large volumes of observability and security data. With these insights,
analysts can automate responses to security problems by creating data-driven
workflows using AutomationEngine.

With up to 70% of security events going uninvestigated, security analysts need
all the help they can get. After a security event, many organizations often
don’t know for months (or even years) when why or how it happened. This
represents a significant risk, with the same attack vector repeatedly getting
exploited if a vulnerability is not resolved on time. The massive volumes of log
data over months, sometimes years, of a breach have made this a complicated and
expensive problem to solve.

A traditional log-based SIEM approach to security analytics may have served
organizations well in simpler on-premises environments. But this limited
approach causes challenges in today’s hybrid multicloud reality. With the rising
complexity of cloud-native environments, manual investigation and response are
too slow and inaccurate. Teams must evolve to continuously create reliable,
automated responses based on precise data-driven insights. Comprehensive
datasets, including topology and runtime context, can make it easier to find the
needle in the haystack and understand the significance of events and
vulnerabilities.

Experience with the recent MOVEit vulnerability illustrated some of the key
incomplete data challenges organizations face when trying to find definitive
answers to questions like “were we exploited?” and “was any sensitive data
stolen?” Relying only on logs to find indicators of compromise (IoC) is no
longer effective, especially for application attacks, because logs simply don’t
contain all the clues. As our experience with MOVEit shows, IoCs that remained
hidden in logs alone quickly revealed themselves with observability runtime
context data, such as metrics, traces, and spans.


EXTENDING APPLICATION SECURITY PROTECTION TO SECURITY ANALYTICS

With Dynatrace Runtime Vulnerability Analytics, Dynatrace customers have reduced
the amount of time and effort spent on identifying and prioritizing
vulnerabilities in both custom code and third-party code. Additionally, Runtime
Application Protection provides the ability to protect from attacks while giving
development teams much-needed time to remediate these vulnerabilities.

Dynatrace Security Analytics now extends these capabilities by combining
predictive and causal AI techniques to help security analysts and architects
investigate suspected or detected attacks and create automated response
workflows. Security Analytics combines Dynatrace platform capabilities (such as
Grail data lakehouse and AutomationEngine) with analytics capabilities (such as
Dynatrace Pattern Language (DPL) architect) that make life easier for security
analysts.

In an industry first, customers can conduct threat detection, forensics, and
incident response use cases based on a combined security and observability
dataset enhanced by topology context. Grail can deal with any data, be it
OpenTelemetry data or large-scale amounts of security data. Dynatrace OneAgent
automatically discovers relevant observability and topology data across complex
environments, which provides context and rich data. This is a differentiated and
more evolved approach than simply using logs, maximizing the precision, breadth,
and depth of insights.


UNKNOWN UNKNOWNS: UNVEILING THE BLACK SWANS OF CYBERSECURITY

Unknown unknowns, also known as “black swans” in the realm of cybersecurity, are
the elusive and unforeseen threats that exist beyond the scope of our awareness.
These lurking dangers pose a significant challenge to organizations, as they
can’t be detected or addressed using traditional security measures alone.
Unraveling these hidden threats requires a proactive and adaptive approach,
leveraging advanced technologies and threat intelligence to uncover
vulnerabilities and mitigate potential risks. Understanding the unknown unknowns
is crucial in fortifying defenses and safeguarding against the unexpected.


SECURITY ANALYTICS AND AUTOMATION DEAL WITH UNKNOWN-UNKNOWNS

With Security Analytics, analysts can explore the unknown-unknowns, facilitating
queries manually in an ad hoc way, or continuously using automation. This
approach addresses classic security-driven log analysis and SIEM use cases, and
includes threat hunting and looking for anomalies or IoCs.

 * Observability (runtime) context: Utilizing contextualized observability data,
   you can combine traces, logs, and metrics with security events using
   AI-driven analysis. This combination elevates use cases that were
   historically conducted predominantly on only log data. As a result, not only
   can you understand, for example, that someone accessed a database, but also
   from where they came, exactly what they accessed, and to where they exported
   the data–to the level that we know the exact database query statement.
 * Automation: Automation plays a crucial role in dealing with the complexities
   and scale of cybersecurity. By automating routine tasks, such as data
   collection, analysis, and incident response, organizations can improve their
   ability to detect and respond to unknown unknowns in a timely manner. With
   automated processes, you can rapidly identify patterns, correlations, and
   deviations, allowing security teams to focus on investigating and mitigating
   emerging threats. Additionally, automation enables faster threat containment,
   reduces response times, and minimizes the potential for human error.
 * Advanced analytics: Advanced analytics techniques, including causal Davis AI
   and generative AI, facilitate human interaction, enable organizations to
   analyze vast amounts of data, and extract valuable insights. By applying
   advanced analytics to security and contextualized observability data,
   organizations can uncover hidden patterns, trends, and anomalies that may
   indicate the presence of unknown unknowns that may go undetected by
   traditional security measures. Advanced analytics empowers organizations to
   detect and respond to emerging threats proactively, staying ahead of cyber
   adversaries.


WHAT CAN YOU DO WITH DYNATRACE SECURITY ANALYTICS?

Here are some samples of what you can do today with Dynatrace Security
Analytics.

 * Threat hunting: Dynatrace Security Analytics provides analysts with unique
   capabilities that enhance productivity by collaboratively investigating
   suspected attacks, automating response, and implementing proactive
   threat-hunting strategies. Notebooks enable teams to create playbooks to
   iteratively construct complex queries, review results, and refine to quickly
   zoom on IoCs. DPL (Dynatrace Pattern Language) simplifies extracting
   information out of varied log formats without needing to write complicated
   regex. Analysts can use AutomationEngine to continuously monitor and respond
   to IoCs.
 * Incident response: With cost-effective, long-term data retention allowing
   teams to go back in time for months or years to identify the root cause of
   the attack. The combination of data with retained context and lightning-fast
   queries empowers analysts to identify IoCs, reconstruct events, and determine
   next steps in record time. Analysts can leverage AutomationEngine to
   continuously monitor and respond to future attacks.
 * Log storage and data retention: As regulations grow more stringent, data
   retention requirements and costs can quickly mount. Dynatrace Grail data
   lakehouse offers a scalable, affordable way to store data long term while
   keeping all data always available for dashboarding and analysis.


WHAT’S NEXT FOR SECURITY ANALYTICS?

Security Analytics with Davis® AI, the Grail data lakehouse, AutomationEngine,
and Notebooks are all available for customers to use today.

In the coming months, we look forward to further enhancing analyst productivity
with Davis CoPilot generative AI and security-specific user experiences. Davis
CoPilot will enable natural language queries, suggest CISO dashboards to track
progress, and auto-create security incident response workflows using
AutomationEngine.


LEAVE THE BEATEN PATH OF TRADITIONAL SECURITY TOOLING FOR A FUTURE WITH UNIFIED
OBSERVABILITY AND SECURITY

Proactive incident response is based on understanding what’s happening at
runtime in real-time across the full stack by identifying suspicious activities
that may lead to potential breaches. This modern approach puts security analysts
in the driver’s seat. A coordinated organizational approach to patching
vulnerabilities or initiating incident response before an actual breach occurs
increases speed, and reduces costs, and accelerates innovation. The overall
reduced risk of falling victim to cyber-crimes readies organizations utilizing
Dynatrace’s unified observability and security platform for the projected
increase in cyber-attacks.

Attending the Black Hat conference in Las Vegas? Come meet us at booth #2608 to
see Security Analytics in action and learn how to elevate your cyber defenses
with Dynatrace.


SHARE BLOG POST




STAY UPDATED

Enter your email

 * All updates
 * Blog posts
 * Product news

Subscribe now
Tags: featured, forensics, incident response, Security Analytics, threat
detection, threat hunting
Disclaimer: The views expressed on this blog are my own and do not reflect the
views of Dynatrace LLC or its affiliates.
You may also like


FIND VULNERABILITIES IN YOUR CODE—DON’T WAIT FOR SOMEONE TO EXPLOIT THEM

By Gerhard Byrne -
February 13, 2023
Read now



DYNATRACE EXPANDS DAVIS AI WITH DAVIS COPILOT, PIONEERING THE FIRST HYPERMODAL
AI PLATFORM FOR UNIFIED OBSERVABILITY AND SECURITY

By Alois Reitbauer -
July 25, 2023
Read now



TTP-BASED THREAT HUNTING WITH DYNATRACE SECURITY ANALYTICS AND FALCO ALERTS
SOLVES ALERT NOISE

By Mario Kahlhofer -
August 9, 2023
Read now


LOOKING FOR ANSWERS?

Start a new discussion or ask for help in our Q&A forum.

Go to forum
A Leader and positioned furthest for Vision and highest in Execution in the 2023
Gartner®️ Magic Quadrant™️
Download report



This website uses cookies and other tracking technologies to enhance user
experience and to analyze performance and traffic on our website. With your
permission, we also share information about your use of our site with our social
media, advertising and analytics partners. By clicking “Accept All Cookies”, you
agree to the storing of cookies on your device to enhance site navigation,
analyze site usage, and assist in our marketing efforts.Privacy Notice

Cookies Settings Strictly Necessary Cookies Only Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalization. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices