Red Sift: The new operating model for cyber resilience

Today marks a new milestone for Red Sift as we launched our suite of four interoperable applications built on the new Red Sift Pulse platform that combines cybersecurity intelligence, innovative generative AI and integration with existing security tools, which puts security teams on the path to cyber resilience.

Our collateral on the new applications and Pulse platform provide valuable technical detail on the use cases Red Sift addresses. What I want to do here is put it in the context of the overarching challenge we uniquely solve and the innovation behind it.

The idea of cyber resilience is not new. It’s something that our friends at NIST, the NCSC and others have advocated for some time. NIST defines it as “The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” While the concept is not new, it remains somewhat of a holy grail for most organizations.

I find it more practical to talk about how to shift an organization’s security posture from reactive to proactive, i.e. from responding to incidents to preventing intrusions that disrupt businesses. Achieving this requires a new operating model that is continuous, automatic and proactive. Red Sift delivers this capability through a suite of four interoperable applications that defend against brand abuse, exact email impersonation, and vulnerable internet-facing cloud assets and certificates.

Let’s dig into how these applications combined with Pulse enables the new operating model described above.

Continuous. This is about seeing your defenses and emerging risks in real-time. This requires a strategic platform with applications that not only interoperate with each other through a shared data and asset inventory but also the wider ecosystems of solutions our customers use. We do this through REST APIs so that we can ingest terabytes of cybersecurity intelligence to give organizations complete visibility of all of their assets and potential risks. Customers also can push Red Sift application data to leading XDR platforms to integrate with existing workflows.

Automatic. It is well known that organizations have long suffered from significant understaffing challenges. This requires a solution that enables them to drive operational efficiencies at scale across their teams. We have used advanced machine learning in Red Sift solutions from our inception and bring this innovation history to bear in two ways. The first is to use generative AI to solve complex, multi-step problems for our customers in a reliable, explainable and integrated manner across the suite. This approach to generative AI coupled with the fact that it works now is extremely unique. We also use natural language understanding to allow security teams to navigate large and complex data sets and allow them to create alerts against them. We do this through a hosted version of GPT that gives teams the data they want and allows them to use natural language to instruct the platform to make an alert for future notifications. This is not hypothetical as it is with other solutions in the market. It’s available today.

Proactive. When we talk about proactive security, it means remediating risk before an active threat emerges. A perfect example of how we do this is through Brand Trust, our solution for brand impersonation monitoring and protection. Through Brand Trust we’re helping organizations answer key questions such as, what lookalike domains and subdomains exist for my company and our subsidiaries? And once you know that, how do you easily take action on those discoveries? Brand Trust provides continuous intelligence on every lookalike domain through industry-leading name-matching algorithms, GPT-powered subsidiary identification and a powerful logo-matching engine. It surfaces relevant information based on WHOIS data, DNS signals, live spam data and more to drive informed decisions. And it makes it easy to create packages to report malicious sites to Google Safe Browsing and our integrated take-down partners.

I’m extremely proud of the team’s hard work in bringing this new application suite to market. The bottom line value to our customers rests on integration and leverage. We know that if security teams are going to deal with their regulatory burden and operational overhead both now and in the future, they need solutions that integrate with their workflow and the tools already in place to give them more leverage.

As an innovative partner to these organizations, we’re automating and integrating these complex and tedious workflows in a manner that helps organizations have a more proactive stance on security. With this launch, we’re setting up that future with the solution that makes that a reality – today!

To learn more and request a demo, please reach out to me or sign up to talk to one of our experts.

PUBLISHED BY

Rahul Powar

2 Nov. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DORA

Countdown to compliance: Are you ready for the DORA deadline?

Jack Lilley

The European Union’s (EU) Digital Operational Resilience Act (DORA) deadline approaches, with just one week to go before the DORA applies to all financial entities and their ICT service providers on January 17 2025. Sectors affected by the DORA include but are not limited to: Understanding and ensuring compliance with the upcoming legislation need…

Read more
AI

Predictions for 2025: Cybersecurity and the increasing rise of AI

Rahul Powar

2025 is set to be the year where cybersecurity and AI will be defined by the deepening interplay between technology and governance, the integration of AI into everyday business functions, and the reimagining of cybersecurity as a business enabler. Organizations that embrace these trends will gain not only a technological edge but also a…

Read more
News

Winter wins: Red Sift OnDMARC wraps up 2024 as a G2 DMARC…

Francesca Rünger-Field

The season of giving has brought us another reason to celebrate! Red Sift OnDMARC continues its winning streak in G2’s Winter 2025 report, earning Leader status in the DMARC category for another consecutive season. This recognition reflects our strong market presence and the unwavering satisfaction of our customers. Cheers to wrapping up 2024 on…

Read more
AI

Text classification in the age of LLMs

Phong Nguyen

As natural language processing (NLP) advances, text classification remains a foundational task with applications in spam detection, sentiment analysis, topic categorization, and more. Traditionally, this task depended on rule-based systems and classical machine learning algorithms. However, the emergence of deep learning, transformer architectures, and Large Language Models (LLMs) has transformed text classification, allowing for…

Read more