BlackBerry Cylance

BlackBerry Cyber Security Compromise Assessment Service now available in New Zealand

Advantage named First BlackBerry Compromise Assessment partner in New Zealand

Advantage has been named as New Zealand’s first BlackBerry Compromise Assessment partner, enabling the company to deliver this leading consulting service to the New Zealand market.

The BlackBerry Compromise Assessment (CA) is designed to detect indications of compromise such as data exfiltration and sabotage, command and control activities, user account anomalies, or malware infection. The artefacts are used to detect active or historical cyber security breaches.

Following its acquisition of Cylance in February 2019, BlackBerry offers an agentless compromise assessment tool as part of its suite of services, which helps to prevent future attacks by determining if a compromise has already happened, providing visibility across an entire enterprise quickly and effectively.

Cylance Consulting’s Compromise Assessment evaluates an organization’s security posture to determine if a breach has occurred or is actively occurring. Cylance Consulting can determine when, where, and how a compromise occurred, and provide tactical recommendations for preventing another attack. By integrating artificial intelligence into tools and processes, Cylance Consulting experts secure environments while swiftly identifying a compromise, resulting in a preventative security approach.

A Compromise Assessment utilizes a methodology for identifying environmental risks, security incidents, and ongoing threat actor activity in a network environment. The assessment identifies ongoing compromises and uncovers the malicious access and usage of the environment. The goal is to detect and stop any active security incidents quickly and quietly.

The assessment is composed of three phases — with each phase more targeted — and addresses core problems such as:

  • Data exfiltration and sabotage
  • Command and control activities
  • User account anomalies
  • Malware and persistence mechanisms
  • Network, host, and application configurations

“The goal of BlackBerry’s Compromise Assessment is to proactively determine if a network is compromised and to stop any active security incidents quickly and quietly,” said Jason Duerden, Managing Director, BlackBerry Spark, Australia and New Zealand.“

Our Compromise Assessment incorporates BlackBerry’s artificial intelligence into tools and back end data analysis processes to more efficiently and effectively secure the environment and prevent attacks.”

As the solution is agentless, customers do not need to be active BlackBerry users and it is compatible with networks of all kinds, including operational technology (OT) and Industrial Control Systems (ICS).

At the conclusion of the assessment, a comprehensive report is provided to the customer that includes details on detected activity, the current risk state and strategic recommendations for remediation.“This service is aimed at medium to large companies and takes around four to six weeks of engagement,”

Steve Smith, Advantage Regional Sales Executive said:

“Once threats have been assessed and mitigated, you will have the ability to draw a line in the sand, with all systems cleaned, and be well prepared for a health check a year later.”

Smith continued:

“Advantage has over 35 years of experience in the New Zealand IT market, providing enterprise class solutions across almost all market segments including government, medical, retail, financial and legal. We are a technically driven organisation that focuses on a true partnership with our clients – their success is intrinsically linked to ours.”

“To achieve this goal in today’s IT landscape, we maintain a level of flexibility and agility that few providers are able to rival. Our focus is on building scalable and secure solutions for customers that rely on highly connected IT services. Everything we do is secure by design and generally incorporates one or more of our security services which are often no longer optional in today’s environment. All services that we provide can be fully managed, customer managed, or jointly managed, based on the customer’s requirements and internal resources.