From detection to security insights with CrowdStrike LogScale and Mimecast
By integrating Mimecast and CrowdStrike LogScale, organizations gain search and correlation capabilities across all log types to detect and respond to cyber attacks. Live searches and near real time dashboards cut detection times and blazing fast search empowers incident response and threat hunting teams to uncover the full kill chain and proactively find potentially malicious activity. LogScale blazing fast search performance enables threat hunters to quickly ask any questions of their Mimecast data, including complex correlation searches across multiple data sources.
Solution Overview
1. Emails received by Mimecast are passed through a series of hygiene scanning techniques, to ensure that they are safe before delivery to the recipient.
2. Email intelligence provided by Mimecast is sent to CrowdStrike Logscale for normalization and correlation.
3. CrowdStrike Logscale uses the email intelligence to alert analysts and add context to data from other security tool data sources.
Mimecast and CrowdStrike Logscale Use Cases:
Mimecast data ingested adds additional data and context within CrowdStrike Logscale to aid:
Phishing
Compromised Accounts
Lateral Movement
Key Benefits
01.
Add context to your Mimecast logs by correlating with other log sources including infrastructure, network and software logs.02.
CrowdStrike Logscale unique architecture enables customer's to log everything to miss nothing.
03.
Get more value from Mimecast IOC detections by searching for these across other log sources.
04.
Contain attacks earlier with rapid detections and response to phishing and business email compromise tactics.
05.
Empower threat hunters with blazing fast search across logs from the #1 attack vector, email.
06.
Enable investigations to uncover the full kill-chain right back to the initial email compromise