Cyber security is no longer an option, it is essential. Without the effectiveness of our experts, several companies would have been hard hit by a recent critical vulnerability in Palo Alto Networks systems.Cyber security is no longer an option, it is essential. Without the effectiveness of our experts, several companies would have been hard hit by a recent critical vulnerability in Palo Alto Networks systems.
The massive computerisation of industrial activity, the speed of a cyber-attack and the increasing performance of hackers make cybersecurity an essential part of a company's life and survival.
The recent critical vulnerability at the heart of Palo Alto Networks' systems (rated 10... on a scale of 10) is a further illustration of this. This breach allowed hackers to penetrate a computer system and, for example, demand a ransom or delete all a company's data.
In less than two hours, our teams drew up an effective and robust line of defence that countered more than five thousand recorded break-in attempts against our company and our customers in less than three days. Without this rapid response, our entire infrastructure and that of our customers could have been breached, with serious operational, financial and reputational consequences.
Our customers who have subscribed to the Threat Management service have been able to continue their business with complete peace of mind. Our experts have proactively verified the impermeability of their systems and taken the necessary steps to ensure their safety.
Threat management, Security Operations Centre, CSIRT, back up... Contact us to benefit from the NRB Group's expertise
The story of a vital intervention
12 April
10:07 a.m.
The SecOps team launches its analysis to strengthen its infrastructure and that of its customers, following a publication by Palo Alto Networks a few minutes earlier, that mentions the presence of a critical vulnerability within its systems.
10:28 a.m.
The Network team is taking two steps to counter the threat: it is disabling telemetry and applying the temporary protection offered by Palo Alto Networks.
11:18 a.m.
Our staff contact customers who have subscribed to the Threat Management service to explain the state of the threat and the decisions taken to protect them effectively.
11:28 a.m.
The SecOps and Network teams carry out a new series of tests to ensure that the line of defence established in just a few minutes is effective. Result: everything is perfectly protected.
13 April
4:00 p.m.
A public exploit (instructions on how to penetrate the vulnerability) is published on the Internet. Our experts are once again testing the robustness of the defence set up the day before.
5:48 p.m.
The results are positive. A hacker cannot penetrate our infrastructure despite the public release of the exploit. The next thing is that our staff are learning that a customer who has not subscribed to the Threat Management service is under threat. Concerned, they contacted him so that he could react immediately.
17 April
7 p.m. -> 4 a.m.
Our staff are updating around forty firewalls following the publication of the Palo Alto Networks patch, which permanently resolves the vulnerability.
NRB's 4 solutions to protect your business
Security Operations Center (SOC)
Our experts monitor and detect potential incidents that could impact a customer's infrastructure. Anomaly detection analyses enable them to spot any intrusion by a malicious actor into a company's network.
Threat Management
We keep abreast of new vulnerabilities and trends in the cybersecurity world on a daily basis. Our teams subscribe to qualitative information feeds, enabling them to take proactive measures to offer the best protection to their customers, as was the case following the vulnerability in Palo Alto Networks' systems.
Incident Response
Is your company under attack? We will send a team of experts to restore the situation as quickly as possible. They will trace the source of the attack, detect the infected elements and help you get your business back up and running as quickly as possible.
Back up
We offer an efficient and reliable back-up system. Our customers can count on an online back-up that is regularly updated, as well as an offline back-up that is entirely incapable of being attacked and can be deployed rapidly if needed.