Red Sift: The new operating model for cyber resilience

Today marks a new milestone for Red Sift as we launched our suite of four interoperable applications built on the new Red Sift Pulse platform that combines cybersecurity intelligence, innovative generative AI and integration with existing security tools, which puts security teams on the path to cyber resilience.

Our collateral on the new applications and Pulse platform provide valuable technical detail on the use cases Red Sift addresses. What I want to do here is put it in the context of the overarching challenge we uniquely solve and the innovation behind it.

The idea of cyber resilience is not new. It’s something that our friends at NIST, the NCSC and others have advocated for some time. NIST defines it as “The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” While the concept is not new, it remains somewhat of a holy grail for most organizations.

I find it more practical to talk about how to shift an organization’s security posture from reactive to proactive, i.e. from responding to incidents to preventing intrusions that disrupt businesses. Achieving this requires a new operating model that is continuous, automatic and proactive. Red Sift delivers this capability through a suite of four interoperable applications that defend against brand abuse, exact email impersonation, and vulnerable internet-facing cloud assets and certificates.

Let’s dig into how these applications combined with Pulse enables the new operating model described above.

Continuous. This is about seeing your defenses and emerging risks in real-time. This requires a strategic platform with applications that not only interoperate with each other through a shared data and asset inventory but also the wider ecosystems of solutions our customers use. We do this through REST APIs so that we can ingest terabytes of cybersecurity intelligence to give organizations complete visibility of all of their assets and potential risks. Customers also can push Red Sift application data to leading XDR platforms to integrate with existing workflows.

Automatic. It is well known that organizations have long suffered from significant understaffing challenges. This requires a solution that enables them to drive operational efficiencies at scale across their teams. We have used advanced machine learning in Red Sift solutions from our inception and bring this innovation history to bear in two ways. The first is to use generative AI to solve complex, multi-step problems for our customers in a reliable, explainable and integrated manner across the suite. This approach to generative AI coupled with the fact that it works now is extremely unique. We also use natural language understanding to allow security teams to navigate large and complex data sets and allow them to create alerts against them. We do this through a hosted version of GPT that gives teams the data they want and allows them to use natural language to instruct the platform to make an alert for future notifications. This is not hypothetical as it is with other solutions in the market. It’s available today.

Proactive. When we talk about proactive security, it means remediating risk before an active threat emerges. A perfect example of how we do this is through Brand Trust, our solution for brand impersonation monitoring and protection. Through Brand Trust we’re helping organizations answer key questions such as, what lookalike domains and subdomains exist for my company and our subsidiaries? And once you know that, how do you easily take action on those discoveries? Brand Trust provides continuous intelligence on every lookalike domain through industry-leading name-matching algorithms, GPT-powered subsidiary identification and a powerful logo-matching engine. It surfaces relevant information based on WHOIS data, DNS signals, live spam data and more to drive informed decisions. And it makes it easy to create packages to report malicious sites to Google Safe Browsing and our integrated take-down partners.

I’m extremely proud of the team’s hard work in bringing this new application suite to market. The bottom line value to our customers rests on integration and leverage. We know that if security teams are going to deal with their regulatory burden and operational overhead both now and in the future, they need solutions that integrate with their workflow and the tools already in place to give them more leverage.

As an innovative partner to these organizations, we’re automating and integrating these complex and tedious workflows in a manner that helps organizations have a more proactive stance on security. With this launch, we’re setting up that future with the solution that makes that a reality – today!

To learn more and request a demo, please reach out to me or sign up to talk to one of our experts.

PUBLISHED BY

Rahul Powar

2 Nov. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more
DMARC

Mail Check is changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more