Accenture, Endgame invent anti-hacking solution

Accenture and Endgame have created a threat hunting as-a-service offering for clients.

Powered by Endgame and operated by Accenture senior cybersecurity hunters, the service stealthily helps to identify and surgically remove known and never before seen adversaries that have evaded traditional security methods.

Core to the offering are Accenture’s seasoned global cybersecurity hunters, whose deep experience enables them to identify and terminate the efforts of latent attackers targeting organisations’ intellectual property, business systems or other key assets.

The company said that clients could benefit from continuous business operations, free from disruption faced by users of traditional security approaches, which are typically under siege for months as they try to identify and remediate sophisticated adversaries.

“Today, cyber attackers can circumvent even the most fortified of traditional enterprise defence systems,” the Managing Director, Accenture Analytics (Security Lead), Vikram Desai, said.

He added, “Rather than building a taller defensive wall, we are giving our clients the ability to strike first – to stop adversaries before they attack. Delivering this capability requires two fundamental elements: battle-tested experience outmaneuvering enemies and specialised technology that gives you an unfair advantage.

“With Endgame, this is exactly what our hunting as-a-Service offering delivers. Armed with it, our clients spend less time dealing with threats and more time on innovation and growth.”

The Chief Executive Officer of Endgame, Nate Fick, said, “Attackers are winning far too often. We need to compress adversary dwell time by vigorously hunting across the enterprise architecture and terminating malicious behaviour before it can get too far.”

He added, “Endgame and Accenture’s joint solution combines state-of-the-art technology with top-notch talent in order to deliver an always on, end-to-end hunt solution that simply outsmarts traditional Indicators of Compromise and signature-based tools.”