{"id":683,"date":"2020-02-17T10:50:45","date_gmt":"2020-02-17T10:50:45","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=683"},"modified":"2021-03-11T15:15:49","modified_gmt":"2021-03-11T15:15:49","slug":"mtr-or-siem","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2020\/02\/products\/mtr-or-siem\/","title":{"rendered":"MTR or SIEM \u2013 Tell me what you want, what you really, really, want\u2026"},"content":{"rendered":"<p>Most of the time when a customer is asking for a SIEM, really they just want a way to detect threats across their environment, and they think SIEM is the only way to achieve this. It\u2019s not, and for many customers, Sophos MTR makes much more sense.<\/p>\n<p>A few customers I\u2019ve spoken with recently are considering buying a SIEM or an SIEM service. With a bit of probing about what they\u2019re trying to achieve, we\u2019ve got them interested in Sophos MTR as an alternative.<\/p>\n<p>Security Incident and Event Management systems, or SIEM, have been around for a long time. Many IT managers are under the misconception that SIEM is the only way to get a complete view of what\u2019s happening on their network.<\/p>\n<p>An SIEM takes alert data from firewalls, endpoints, switches and other sources and tries to make sense of these alerts to detect attacks. However, this alerts-based approach is slow, unreliable, and prone to \u201calert fatigue.\u201d A lot of time and effort is required to manage, configure, and tune an SIEM. Even if the SIEM detects an attack, someone still needs to respond to the threat. And don\u2019t forget, an SIEM doesn\u2019t replace endpoint protection. Our customers will still need Intercept X on their servers and PCs.<\/p>\n<p>Sophos Managed Threat Response (MTR) offers a better option for your customer to respond to threats across their network. If your customer is already using Sophos Intercept X and Endpoint Detection and Response (EDR) there\u2019s no additional software to install, configure, or tune. MTR augments Sophos\u2019 Intercept X and EDR with osquery to build a searchable SQL database of every computer OS in your environment.<\/p>\n<p>The Sophos MTR team regularly executes scheduled queries on every endpoint to capture useful data to detect and investigate threats. Live queries can also be executed to return information immediately from the endpoint for threat hunting, incident response, and investigations.<\/p>\n<p>The MTR team reviews details on detections, endpoint-related information, and checks to see if the detection was seen on other endpoints. They can see detailed information about what was executed, allowing for further investigation into the pid, parent process, and relevant hashes.<\/p>\n<figure id=\"attachment_2851\" aria-describedby=\"caption-attachment-2851\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"framed-image wp-image-2851 size-full\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/Sample-Managed-Threat-Response-Report.png\" alt=\"\" width=\"640\" height=\"675\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/Sample-Managed-Threat-Response-Report.png 647w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/02\/Sample-Managed-Threat-Response-Report.png?resize=285,300 285w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-2851\" class=\"wp-caption-text\">Above \u2013 a sample Sophos Managed Threat Response Report<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Furthermore, unlike with SIEM, the MTR team will respond, 24 hours a day, 7 days a week. They can:<\/p>\n<ul>\n<li>Change configurations to manage an active threat, including adjusting threat policies, enabling EDR\/MTR on unprotected devices, and adjusting exclusions<\/li>\n<li>Use Sophos Central&#8217;s isolate host functionality to limit a compromised asset\u2019s exposure<\/li>\n<li>Block files by SHA256 within an environment to prohibit malicious content from running<\/li>\n<li>Initiate a system scan<\/li>\n<li>Block a specific website or IP address through web control<\/li>\n<li>Block a specific application through application control<\/li>\n<li>Use a Live Terminal for direct access to the host<\/li>\n<\/ul>\n<p>So, next time you hear your customer mention SIEM, ask them: who\u2019s going to respond to the SIEM alert at 3 a.m. on a Sunday morning?<\/p>\n<p>Instead, offer them Sophos MTR, the better option to detect attacks on sensitive data assets and respond to incidents before they become a breach. Even at 3 a.m. on a Sunday morning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of the time when a customer is asking for a SIEM, really they just want a way to detect threats across their environment, and they think SIEM is the only way to achieve this. It\u2019s not, and for many customers, Sophos MTR makes much more sense.<\/p>\n","protected":false},"author":11,"featured_media":385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[41],"coauthors":[64],"class_list":["post-683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-managed-threat-response"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2019\/11\/featured-image-mtr.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=683"}],"version-history":[{"count":6,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/683\/revisions"}],"predecessor-version":[{"id":2852,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/683\/revisions\/2852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/385"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=683"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}