Select Page

Extended Detection & Response

Hillstone XDR Solution

Evolved Enterprise Environment

The modern enterprise environment bears little resemblance to the past environment. An organization’s entire information technology (IT) stack no longer consists entirely of owned on-premises solutions. The ongoing move to the cloud has allowed businesses more flexibility, affordability, and scalability, but has also increased the attack threat surface drastically. To keep track of the changing environment, countless security products have been released and are placed all across an enterprise’s security infrastructure. However, simply having this increase in security products does not guarantee increased coverage

More Data, More Problems

Data, the lifeblood of the network and, by extension, cybersecurity, is collected, but not analyzed and correlated in an effective manner that can generate actionable reports. As a result, security teams end up with piles of fragmented data. It is difficult to efficiently leverage this data because of the following reasons.

Too many false positives

Analysis paralysis

Siloed security data lacking context

Lack of skilled cybersecurity professional

XDR is a Modern Solution for the Modern and Evolving Enterprise

By design, XDR is a flexible, easy-to-integrate, comprehensive, and comprehensible security solution for organizations dealing with extensive technology sprawl. For one, XDR integrates with as many data sources as possible and contextualizes the metadata—giving security teams the ability to generate insights from across the IT/OT environment. Moreover, D&R becomes cross-layered across these data points, mitigating the tunnel vision that sometimes comes from traditional methods such as EDR.

Hillstone iSource: AI-powered XDR Solution

Hillstone iSource is a data-driven, AI-powered XDR platform that integrates massive security data, correlates and investigates incidents, identifies potential threats, and automatically orchestrates security to respond cohesively across multiple security products and platforms. iSource brings a radical new approach to cybersecurity with unrivaled security operation efficiency.

Integration Spanning the Ecosystem

iSource can integrate a wide variety of data across the full spectrum of the network, from endpoints to cloud. This data can include NetFlow, Sysmon, Syslogs, metadata, threat information and third-party logs, all of which are then standardized, correlated and analyzed to provide complete visibility and break down security information silos. It not only brings full security visibility with far fewer blind spots, but also improves detection accuracy by minimizing false positives.

AI- and ML-Powered Big Data Analysis

iSource leverages information from third-party intelligence partners worldwide to provide additional input for the analysis engine to leverage and enable comprehensive vulnerability and risk management. Additionally, by integrating with third-party partners, iSource gains a very comprehensive signature database. Pairing this with machine-learning technology that Hillstone has been developing since the early 2010’s yields a very thorough correlation analysis engine that is capable of generating in-depth, concise, high-confidence logs in limited quantity. During this process, false positives and duplicates are additionally eliminated to further mitigate alarm fatigue for security teams.

Automated Security Orchestration and Cohesive Response

If a remediation strategy has been configured, once a threat is identified, iSource will automatically execute the appropriate mitigation actions according to a predefined playbook. Templated playbooks are

created according to default templates provided by Hillstone Networks for common vulnerabilities. This option is especially helpful for hamstrung security teams, or enterprises that lack a team of skilled cybersecurity professionals.  Alternatively, the customizable playbooks can be user-defined and built from scratch, tailored for the user’s business needs. iSource includes the option of eliminating automatic implementation of mitigation strategies and leaving that step purely up to the discretion of the user. If playbooks are implemented, iSource will communicate recommended action steps back to the point security solutions and services that are fully integrated with iSource.

Unified Management and Reporting

Hillstone’s iSource offers a customizable dashboard that allows simple access to the organization’s security posture with comprehensive statistical information such as rankings of threat events by criticality level, as well as incident summarization and security trends with graphical charts and lists. iSource also supports template-based or customizable reports that can be scheduled or generated on demand. Public APIs enable integration with third-party tools or security products to delineate the necessary remediation steps.

Recent Blog Articles

iSource 2.0R12: Unlocking New Capabilities for IT Management

Leveling Up Your Security Game: What’s New in Recent BDS Releases

HSM 5.6.0: Taking Centralized Management to the Next Level

Learn More about XDR

Engage with us to learn more about Hillstone’s XDR solutions by contacting your local authorized Hillstone Networks reseller.

Contact Us 

For the 4th year in a row, Hillstone Networks has been recognized in Gartner Peer Insights Customers’ Choice for Network Firewalls.

The Customers’ Choice is a rating of vendors in a given market — for Hillstone, it’s Network Firewalls — that take into account both the number of reviews and the overall user rating. Based on feedback and ratings from our end users who have purchased, implemented and are happily using our products and services, Hillstone’s overall rating came to 4.9.