• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Surveys
  • Partners
    • Request a Briefing
    • Become a Partner
    • Landing Pages
    • Bookings
      • Approved Interview Form
      • Approved Interview Form – Returning Guest
      • Book a Conference Interview
      • Conference Collection Form
  • Hosts
  • Company
    • About
    • Contact
    • Careers

Application Security/ Articles/ Asset Management/ Blue Team/ Cloud Security/ Compliance/ Configuration Management/ Container Security/ Endpoint Security/ Vulnerability Management

Building A Truly Unified Endpoint Data Platform

Matt Alderman December 4, 2020

There are a lot of endpoint security solutions on the market.  How do you pick and choose which solution is right for you?  The answer may depend on which endpoints you want to protect. Windows? MacOS? Linux? All of the above?  What about containers and cloud infrastructure?

When we think of traditional endpoints, we immediately focus on traditional operating systems.  However, with the expansion of cloud infrastructure and containers, the definition of an endpoint is expanding.  Deploying agents to all of these endpoints could be challenging or not even possible, depending on the cloud platform.  So how can you build a truly unified endpoint data platform?

Facebook started to address this with the release of osquery, an operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD.  With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes across all platforms, creating normalized security telemetry.  This enabled organizations to easily ask questions of their endpoint fleet, such as “Are there processes running without a binary on disk?”  “Are there primary disks that are unencrypted?”  “What servers had a root login in last hour?”  Unfortunately, osquery did not extend into some of the new endpoints, like containers.  That’s where Uptycs comes in…

Uptycs took the concept of osquery as a unified endpoint and took it to the next level.  By leveraging the foundations of osquery and the concept of SQL-driven analytics, Uptycs built a truly unified endpoint data platform by:

  • Creating a scalable SaaS offering to centralize management of the osquery agents
  • Incorporating other data sources, including containers, Kubernetes, and cloud providers such as Amazon Web Services 
  • Applying osquery security telemetry to a number of use cases, including:
    • MITRE ATT&CK detection coverage
    • vulnerability monitoring
    • file integrity monitoring
    • CIS Benchmark checks, and
    • compliance evidence gathering (PCI, SOC 2, FedRAMP, etc)

To understand how Uptycs can transform telemetry from endpoints, containers, cloud instances, and cloud providers to create a unified endpoint data platform, watch the interview on Enterprise Security Weekly here or visit securityweekly.com/uptycs for more information.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

4-tips-for-making-better-decisions-scaled

Application Security /

Integrating Application Security Testing Data to Drive Better Decisions

abstract-technology-science-concept-brain-digital-link-binary-hi-tech-blue-background_36402-92

Articles /

Selecting the Right Brain for Your Sensors

CT_web_featured_3_20_20

Asset Management /

How Can We Vaccinate Our Networks?

‹ Phishing: The Gift that Keeps on Giving › Applying Math to Solve Risk-Based Vulnerability Management

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS Feed RSS - Posts

Search

Follow Us On Twitter

→ Follow Us
© Security Weekly 2021
Powered by WordPress • Themify WordPress Themes