- Actively block known C2 and emerging threat C2 indicators of compromise
- Integrate real-time threat intelligence into any security solution
- Accelerate threat response by exposing the adversaries and evolving tradecraft targeting infrastructure.
“We know that Cobalt Strike and other open-source tools provide the framework for legitimate ‘red team’ activities. Unfortunately, open-source tools are being used by advanced persistent threat groups to gain access to systems, establish C2, and launch attacks. Thanks to our innovative and dedicated (sic) team, IronRadar can identify threats as new adversarial infrastructure servers appear and before they can be used in sophisticated cyberattacks.”
IronRadar Available From AWS Marketplace
IronRadar is available for all networks — beyond the IronNet Collective Defense platform community — as an annual subscription sold directly from the Amazon Web Services (AWS) Marketplace. Once installed, customers can easily upgrade to join the Collective Defense community at any time.IronNet notes that the Collective Defense platform serves as an early warning system for all participating companies and organizations. Correspondingly, it strengthens network security through correlated alerts, automated triage and extended hunt support.Christopher Kissel, research vice president of Security and Trust Products at IDC, a market intelligence firm, believes that IronRadar is a cybersecurity industry “game changer”:“Detecting weaponized C2 servers before they connect to a network and inflict damage like ransomware and eCrimes is a daunting challenge for all organizations. The launch of the purpose-built threat intelligence feed from IronNet is a game changer because it proactively blocks known, new and unreported C2 infrastructures.”