18 January 2024
GLIMPS x Vade integration: an improvement of Vade for Microsoft 365 in-depth analysis
Articles
Following the development of connectors with Sekoia, HarfangLab and Wallix, our partners in the OPEN XDR Platform, today is the time to highlight the integration between Vade and GLIMPS.
For those who haven’t been keeping up, we’ll start with a quick reminder of what the OPEN XDR Platform is:
The OPEN XDR Platform is a group of specialized, complementary cybersecurity software providers who have joined forces to create a platform offering tangible benefits. The platform is a feature-rich solution, capable of providing an immediate response to the ever-increasing number of cyberattacks.
Its modular, customizable and fully hybrid technology provides information to analysts and security managers for greater visibility and automation.
Who are the players on this platform?
While SEKOIA provides both its XDR Back-End and its Cyber Threat Intelligence platform, HarfangLab brings its EDR to detect and remediate threats on servers and workstations. The GLIMPS teams provide their code conceptualization technology and Extended Malware Analysis Platform for malware detection and analysis. Pradeo enriches the OPEN XDR Platform with its know-how in mobile security, and Vade with its expertise in email security. Gatewatcher brings its Aionig network threat detection and response solution. The latest addition is WALLIX, with its Privileged Access Management offering.
Vade X GLIMPS integration
Today, more than 90% of cyberattacks begin with a malicious email. The security of this flow is vital if companies want to protect themselves effectively against groups of attackers. To meet this challenge, Vade and GLIMPS have been working together to enable their customers and partners to benefit from their respective expertise.
A GLIMPS option is directly integrated into the “Vade for M365” interface, and will make it possible to respond to two specific use cases:
– Instantly raise doubts about files identified as suspicious or malicious
– Perform an in-depth analysis of malware received by e-mail
In the screenshots below, the attachments associated with this email identified as suspicious are extracted and can be sent for analysis to GLIMPS with a single click.
After a few seconds, an initial verdict is available, providing further information on the type of threat identified and its family. If the user requires further contextual information, he or she can switch directly to the GLIMPS Malware Expert interface via the “See full diagnostic” button.
On GLIMPS’s interface, you’ll find a first level of Cyber Threat Intelligence, thanks to the integration of SEKOIA’s CTI feed relating to the malware identified by GLIMPS. You can even click on “View Full Report” to access the full report on the identified threat.
On the other hand, you can benefit from the power of GLIMPS’s unique AI engine, combined with over 30 modules and all the tools an analyst needs to sort out alerts and remove doubts.
For example, thanks to our visualization module, Office, PDF, Image and HTML files can be rendered harmlessly as images or secure documents, simply by clicking on the “File Preview” option – a significant time-saver that eliminates the need to handle suspect files and use virtualized environments.