Reducing the Critical Time from Incident Detection to Containment

Size: px
Start display at page:

Download "Reducing the Critical Time from Incident Detection to Containment"

Transcription

1 White Paper Reducing the Critical Time from Incident Detection to Containment By Jon Oltsik, Senior Principal Analyst May 2014 This ESG White Paper was commissioned by Bradford Networks and is distributed under license from ESG.

2 White Paper: Reducing the Critical Time from Incident Detection to Containment 2 Contents Executive Summary... 3 Enterprises Are Responding to New Threats... 3 Systemic Problems Remain... 4 Incident Detection/Response Demands an Architectural Approach... 6 Bradford Networks: Network Sentry/RTR... 8 The Bigger Truth... 9 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at

3 White Paper: Reducing the Critical Time from Incident Detection to Containment 3 Executive Summary After years of settling for good enough IT security, enterprise organizations now realize that this is no longer an adequate approach. This change of heart can be directly linked with the recent wave of sophisticated malware, targeted attacks, advanced persistent threats (APTs), and visible security breaches occurring over the last few years. Rather than settling for the required coverage that demonstrates internal and external compliance, business executives are now asking tough questions about cybersecurity risk and are even willing to throw money at the problem. CISOs are quite willing to increase budgets to address the new types of threats, but are they taking the most appropriate actions? If not, what types of solutions should they look for to improve risk management, and incident prevention, detection, and response? This white paper concludes that: Enterprises are changing their behavior based on urgent new requirements. Aside from bolstering information security budgets, many enterprises are consolidating the management of their security tools into a Security Operations Center and are turning security analysts into dedicated malware, cybercrime, and forensic experts. This highly specialized staff is embracing new types of advanced malware detection/prevention (AMD/P) appliances that detect incidents in motion by monitoring for suspicious or rogue network traffic. A tactical approach to incident detection/response will not be enough. While doing something is better than nothing, tactical changes can only result in marginal improvement. Why? Many large organizations face systemic problems associated with a shortage of advanced cybersecurity skills, silos of responsibility, and incident response processes that glue together information from an army of disparate point tools. These fundamental issues are creating a severe bottleneck that prolongs the adverse impact associated with emerging cybersecurity threats. Technology solutions must be based upon integration, shared intelligence, and workflow automation. Large organizations can t address these systemic issues with more point tools, so what types of solutions should CISOs look for? ESG believes that incident detection and response technologies require a new level of integration to create an end-to-end architecture for data exchange, shared analytics, and granular policy enforcement. This integrated architecture can help organizations improve security across a closed-loop cycle of risk management, incident prevention, detection, and response. An integrated and correlated architecture that encompasses incident response, security alerts, and endpoint visualization, access, and security (EVAS) can help organizations overcome their current challenges with skills shortages, silos of SOC and NOC information, and manual triage processes. Furthermore, this architecture can result in a series of benefits helping organizations lower risk, improve security, and streamline IT security operations. Enterprises Are Responding to New Threats Over the past several years, enterprises have faced an increasingly dangerous threat landscape. The volume and sophistication of attacks has increased and security breach details fill newspaper headlines, while new IT initiatives such as cloud computing, infrastructure virtualization, and mobile computing continue to alter traditional security methodology. If there is a silver lining sewn into these concerning trends, it is that executives are increasingly aware of the importance of security for the business process and they are budgeting accordingly. According to ESG research, 62% of organizations plan to increase their security budgeting in Additionally, 32% of all organizations surveyed consider information security initiatives to be one of their top spending priorities in the coming year. Just how are organizations using these increasing security budget dollars? According to ESG research, enterprise organizations are: 1 Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014.

4 White Paper: Reducing the Critical Time from Incident Detection to Containment 4 Creating focused teams and resources for addressing malware. CISOs realize that they now need a team of highly skilled security analysts working together to understand malware threats, detect attacks, and respond as quickly as possible. Given this pressing need, ESG research indicates that 31% of enterprises have built a Security Operations Center to consolidate security tools and personnel in one place, while an additional 25% of large organizations have a SOC project underway (see Figure 1). 2 Additionally, 39% of enterprises say they have created a specific group of security analysts dedicated to malware intelligence and analytics. 3 Figure 1. Has Your Organization Built and Staffed a Security Operations Center (SOC)? Has your organization built and staffed a Security Operations Center (SOC)? (Percent of respondents, N=257) No, 13% No, my organization chose to outsource rather than build/staff a SOC, 4% Yes, we have SOC, 31% No but we are interested in building and staffing a SOC, 13% No, but plan on building and staffing a SOC within the next 24 months, 15% No but we have a project underway to build and staff a SOC, 25% Source: Enterprise Strategy Group, Getting help from service providers. Smart CISOs understand that they may not have the right staff or skills to take on cyber threats alone. To bridge this gap, 31% of large organizations are investing in incident response services to support their internal IT security teams in the event of a security breach, while 27% are hiring external experts to train the security staff on how to identify and respond to specific types of threats. 4 Implementing new layers of security controls. More than half (55%) of large organizations allocated specific security budget dollars for new types of anti-malware services and technologies in 2013 such as network sandboxes and advanced threat intelligence feeds. 5 This reflects an increased effort to defend against advanced attacks. Systemic Problems Remain While the increasingly insidious threat landscape is driving cybersecurity changes, these actions are reminiscent of the Little Dutch Boy plugging the dyke with his finger. In spite of the addition of new security products, 2 Source: ESG Research Report, The Emerging Intersection Between Big Data and Security Analytics, November Source: ESG Research Report, Advanced Malware Detection and Prevention Trends, September Ibid. 5 Ibid.

5 White Paper: Reducing the Critical Time from Incident Detection to Containment 5 organizational shifts, and help from managed/professional services, information security remains fraught with systemic problems. Tactical changes won t make much difference as long as enterprises are faced with serious incident detection/response issues such as (see Figure 2) 6 : An acute shortage of cybersecurity skills. Alarmingly, recent ESG research indicates that 25% of mid-sized and enterprise organizations claim that they have a problematic shortage of IT security skills. 7 The situation is even bleaker across certain industries. For example, 36% of government agencies, 29% of transportation and logistics firms, and 28% of financial services organizations report a problematic shortage of IT security skills. Given the severe shortage of cybersecurity talent, CISOs must concentrate their efforts on enabling the security team to work smarter, not harder. A dependence on manual processes. One of the security industry s best kept secrets is that security alerts and incident detection must be followed on by an intricate array of manual processes for further analysis of each event. Furthermore, incident response is often mired by a complex series of workflows, change management, help desk tickets, and IT operations. This hampers organizations because even efficient incident detection/response cycles can take days, weeks, or months to complete. A potpourri of security point tools and analytics. Aside from manual labor, security professionals also depend upon an army of security alerts, analytics, intelligence feeds, and reports to piece together the details about security attacks and the state of the network at any time. For example, a security alert may hint at the presence of malware, prompting the security team to dig into network packet analysis, vulnerability scanning reports, antivirus signature updates, and the endpoint patch management database. Each of these issues is certainly concerning, but CISOs should be extremely troubled by their cumulative ramifications. Under-staffed and under-skilled security teams are forced to prioritize security incidents, analyze them through an array of disconnected security systems, and then respond to the most pressing events through a series of manual investigations and operations. As if this wasn t bad enough, the ESG data also indicates that security teams will likely be distracted by abundant false positive responses. 8 In aggregate, it s pretty clear that the overall incident detection/response system is broken. 6 Source: ESG Research Report, The Emerging Intersection Between Big Data and Security Analytics, November Source: ESG Research Report, 2014 IT Spending Intentions Survey, February Source: ESG Research Report, The Emerging Intersection Between Big Data and Security Analytics, November 2012.

6 White Paper: Reducing the Critical Time from Incident Detection to Containment 6 Figure 2. Challenges with Incident Detection and Response Which of the following challenges does your organization face when it comes to incident detection and response? (Percent of respondents, N=257, multiple responses accepted) Lack of adequate staffing in security operations/incident response team(s) 39% Too many false positive responses Incident detection depends upon too many manual processes Incident detection depends upon too many independent tools that aren t integrated together Sophisticated security events have become too hard to detect for us My organization lacks the right level of security analysis skills needed Lack of adequate data collection/monitoring in one or more critical area Lack of proper level of tuning of our SIEM and other security tools 35% 29% 29% 28% 28% 28% 23% 0% 10% 20% 30% 40% 50% Source: Enterprise Strategy Group, Incident Detection/Response Demands an Architectural Approach As Albert Einstein once said, If I had an hour to solve a problem, I d spend 55 minutes thinking about the problem and five minutes thinking about the solution. Unfortunately, many organizations neglected this sage advice and opted for quick-fix tactical incident detection/response solutions. These tactical moves may have provided nominal improvements, but they failed to address the more systemic people, process, and technology issues. So what s needed? Incident detection/response technologies must become more aware of the state of network infrastructure and connected endpoints at all times. This will require a new level of interoperability between advanced malware detection technology and EVAS for continuous monitoring. Bridging this gap into a cooperative technology and seamless workflows requires: Tight integration. When incident detection devices trigger some type of alert, security analysts will need to know the location and which specific endpoints were active at the time to add context to the alerts. This requires tight integration between incident detection and network and endpoint visibility, access, and security (NEVAS) systems that can align this data from a historical and up-to-the-minute perspective. To cover all bases, continuous monitoring systems must be able to recognize the network infrastructure and the endpoints such as printers, IP phones, and mobile devices that could be used as a beachhead for malware propagation. Visibility into non-pc devices will grow increasingly important as organizations embrace IP-based sensors for Internet of Things (IoT) visibility. In any case, incident detection alerts can become more actionable if they can be correlated with detailed information about the location, endpoint, and user connected to wired switches, wireless networks, and VPNs. Deep visibility. Knowing the endpoints accessing the networks is a start, but security analysts need a lot more data about device types, configurations, applications, and security status. Furthermore, it s critical to map each device and IP/MAC address to actual users in order to investigate suspicious behavior or actual insider attacks. When incident detection and EVAS systems share and analyze this detailed data, security alerts can become more actionable because they are correlated with profiles of every device connected to wired switches, wireless networks, and VPNs.

7 White Paper: Reducing the Critical Time from Incident Detection to Containment 7 Correlation and analytics. In Figure 2, 35% of security professionals identified too many false positives as one of their organization s biggest challenges with incident detection/response. 9 Indeed, false positives are especially frustrating because security analysts are struggling to keep up with the volume of security alerts and simply can t waste valuable time and resources chasing incident detection red herrings. Incident detection and EVAS technology integration can be used to apply in-depth context to security alerts in order to vastly improve event filtering and correlation. How? Alerts can be cross-correlated with EVAS data to identify an actual compromised endpoint, greatly reduce false positives, and accelerate remediation activities. Automation for incident response. The marriage of incident detection and EVAS technologies can help security analysts pinpoint problems, but what then? Given the current reliance on manual processes, security analysts are often forced to open a trouble ticket or bring in the IT operations team to craft a remediation plan. This plan can take hours to create and even longer to execute, increasing the risks and potential damages associated with a security breach. Additionally, security and IT operations teams may be overwhelmed with remediation tasks if multiple systems are compromised at once. To overcome this manual and time-consuming slog, EVAS can be used to enforce security policies through its network access control features. For example, an endpoint transmitting encrypted packets to an IP address in the Ukraine can be instantly removed from the network, while a zombie PC can be redirected to a remediation VLAN for immediate cleanup. ESG believes there is a before and after scenario here. In the before case, incident detection technology is added tactically to the network. Yes, it can be effective at detecting advanced malware attacks, but there is still a lot of manual and tactical work necessary to investigate the alert, put it in context, determine whether it is real, triage and prioritize it against other activities, and execute a remediation plan (see Figure 3). Figure 3. Tactical Incident Detection versus Incident Detection/EVAS Integration Source: Enterprise Strategy Group, Source: ESG Research Report, The Emerging Intersection Between Big Data and Security Analytics, November 2012.

8 White Paper: Reducing the Critical Time from Incident Detection to Containment 8 Bradford Networks: Network Sentry/RTR A number vendors in the market offer integrated partnership portfolios aimed at improving context, communication, and response between different technologies. Security professionals want integration and automation, but a crowded market has made it difficult to separate technology claims from proven technology capabilities. What should they look for? ESG believes that the strategies and priorities outlined in this paper could be an effective reference point in evaluating integrated security response portfolios. One vendor that meets much of the criteria listed here is Bradford Networks, a privately held security company based in Boston, Massachusetts (USA). Bradford recently introduced its Rapid Threat Response (RTR) technology designed to integrate its offering with incident detection technologies from industry leaders such as FireEye, Fortinet, and Palo Alto Networks. In this way, Bradford actually extends EVAS to the network to create network and endpoint visibility, access, and security (NEVAS). Network Sentry/RTR leverages its Live Inventory of Network Connections (LINC) and customized integrations to automatically correlate high fidelity security alerts with compromised endpoints. By automating the complex incident response triage process, Network Sentry/RTR minimizes the risk to assets and intellectual property, protects the brand, and reduces the impact, time, and costs of dealing with cyber threats. In this way, Bradford s RTR solutions provide incident detection and NEVAS technology integration that can actually take organizations beyond basic support and enable CISOs to build and automate an efficient methodology that extends across a closed-loop lifecycle including risk management, incident prevention, incident detection, and incident response (see Figure 4). In this way, large organizations can address their current incident detection response challenges (i.e., skills shortages, false positives, point tools, etc.) and achieve benefits by automating policy enforcement, streamlining IT operations, and minimizing the potential damage of security breaches. Figure 4. Bradford Networks: Incident Detection/NEVAS Integration Covers the Security Cycle Source: Enterprise Strategy Group, 2014.

9 The Bigger Truth White Paper: Reducing the Critical Time from Incident Detection to Containment 9 Increasingly effective malware, the blurring line between network and endpoint security, BYOD, and the IT security skills shortage are combining to make cybersecurity a more pressing need than ever. While prevention has historically been the focus of most organizations, there is a continued shift toward focusing on detection and remediation that is impacting the market. Regrettably however, many CISOs continue to take a tactical approach to address the insidious threat landscape. They buy products, consolidate tools into SOCs, and shift around personnel, but fail to deal with systemic problems associated with incident detection and response. So what s needed? Solutions that can really address common issues around security skills, manual processes, false positive alerts, and disconnected security point tools. This requires new levels of integration, intelligence, analytics, and automation. Bradford Networks solutions provide an essential piece of this puzzle, offering a Live Inventory of Network Connections and real-time policy enforcement for risk management and rapid response. Combined with leading incident detection tools such as FireEye, RTR can actually increase Bradford s potential value to enterprise customers by helping them pinpoint vulnerable systems, identify compromised systems, and accelerate containment. In this way, Network Sentry/RTR can help lower risk, improve incident detection/response efficiency, and streamline IT security operations.

10 20 Asylum Street Milford, MA Tel: Fax:

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

White. Paper. Rethinking Endpoint Security. February 2015

White. Paper. Rethinking Endpoint Security. February 2015 White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed

More information

Information-driven Security and RSA Security Analytics and RSA ECAT

Information-driven Security and RSA Security Analytics and RSA ECAT White Paper Information-driven Security and RSA Security Analytics and RSA ECAT By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by RSA, The Security Division

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

White. Paper. The Big Data Security Analytics Era Is Here. January 2013

White. Paper. The Big Data Security Analytics Era Is Here. January 2013 White Paper The Big Data Security Analytics Era Is Here By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by RSA Security and is distributed under license from

More information

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,

More information

Research Perspectives

Research Perspectives Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed

More information

Integrated Network Security Architecture: Threat-focused Nextgeneration

Integrated Network Security Architecture: Threat-focused Nextgeneration White Paper Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by Cisco Systems

More information

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013 White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of

More information

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: In spite of marginal progress, privileged accounts

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

The ESG Cybersecurity Maturity Model

The ESG Cybersecurity Maturity Model ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations

More information

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) White Paper Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White

More information

VMware and the Need for Cyber Supply Chain Security Assurance

VMware and the Need for Cyber Supply Chain Security Assurance White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under

More information

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst

More information

White. Paper. Endpoint Security Demands Defense-indepth and Advanced Analytics. November 2013

White. Paper. Endpoint Security Demands Defense-indepth and Advanced Analytics. November 2013 White Paper Endpoint Security Demands Defense-indepth and Advanced Analytics By Jon Oltsik, Senior Principal Analyst November 2013 This ESG White Paper was commissioned by Bit9 and is distributed under

More information

Compensating Security Controls for Windows Server 2003 Security

Compensating Security Controls for Windows Server 2003 Security ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

An Analytics-based Approach to Cybersecurity

An Analytics-based Approach to Cybersecurity ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations

More information

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242) Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

Next-generation Security Architecture for the Enterprise

Next-generation Security Architecture for the Enterprise White Paper Next-generation Security Architecture for the Enterprise By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White Paper was commissioned by Palo Alto Networks and is distributed

More information

White. Paper. Understanding and Addressing APTs. September 2012

White. Paper. Understanding and Addressing APTs. September 2012 White Paper Understanding and Addressing APTs By Jon Oltsik, Senior Principal Analyst September 2012 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG. 2012,

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

White. Paper. Good Enough Email Security Is No Longer Good Enough. January 2013

White. Paper. Good Enough Email Security Is No Longer Good Enough. January 2013 White Paper Good Enough Email Security Is No Longer Good Enough By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by Trend Micro and is distributed under license

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG. White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

Redefining Incident Response

Redefining Incident Response Redefining Incident Response How to Close the Gap Between Cyber-Attack Identification and Remediation WHITE PAPER - How to Close the Gap Between Cyber-Attack Identification and Remediation 1 Table of Contents

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation

ForeScout CounterACT. Continuous Monitoring and Mitigation Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

IT S TIME TO RETHINK SECURITY MANAGEMENT A Resource for the Security Professional

IT S TIME TO RETHINK SECURITY MANAGEMENT A Resource for the Security Professional IT S TIME TO RETHINK SECURITY MANAGEMENT A Resource for the Security Professional ONE STEP AHEAD TABLE OF CONTENTS IT S TIME TO RETHINK SECURITY MANAGEMENT 03 INTRODUCTION 05 START SOLVING REAL PROBLEMS

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Trends in Private Cloud Infrastructure

Trends in Private Cloud Infrastructure Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks

More information

The Benefits of a Hybrid Security Architecture

The Benefits of a Hybrid Security Architecture White Paper The Benefits of a Hybrid Security Architecture By Jon Oltsik, Senior Principal Analyst November, 2011 This ESG White Paper was commissioned by Blue Coat Systems, Inc, and is distributed under

More information

White. Paper. Big Data Advisory Service. September, 2011

White. Paper. Big Data Advisory Service. September, 2011 White Paper Big Data Advisory Service By Julie Lockner& Tom Kornegay September, 2011 This ESG White Paper was commissioned by EMC Corporation and is distributed under license from ESG. 2011, Enterprise

More information

Figure 1. Number of Successful Malware Attacks Suffered in the Last 24 Months

Figure 1. Number of Successful Malware Attacks Suffered in the Last 24 Months ESG Brief Strong Cyber Protection: Keeping Bad Stuff Out and Good Stuff In Date: November 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Malicious activity and threats are growing in volume,

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

How To Integrate Identity And Security With A Network-Based Business Process

How To Integrate Identity And Security With A Network-Based Business Process INFORMATION SECURITY BRIEF Business Enablement Demands Tight Identity and Security Integration Date: April 2009 Author: Jon Oltsik, Principal Analyst Abstract: Identity management and security were once

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

The Network Application Security Architecture Requirement

The Network Application Security Architecture Requirement White Paper The Network Application Security Architecture Requirement By Jon Oltsik March, 2011 This ESG White Paper was commissioned by Juniper Networks and is distributed under license from ESG. 2011,

More information

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center White Paper Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center By Mark Bowker, Senior Analyst, and Perry Laberis, Senior Research Associate March 2013 This ESG White Paper

More information

Carbon Black and Palo Alto Networks

Carbon Black and Palo Alto Networks Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

DEC. 2015. Next Generation Security with Endpoint Detection and Response WHITE PAPER

DEC. 2015. Next Generation Security with Endpoint Detection and Response WHITE PAPER DEC. 2015 Next Generation Security with Endpoint Detection and Response WHITE PAPER Table of Contents Endpoint Compromise a Sad State of Reality... 3 Traditional Endpoint Anti-virus Isn t Getting It Done...

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

The Internet of Things: A CISO and Network Security Perspective

The Internet of Things: A CISO and Network Security Perspective White Paper The Internet of Things: A CISO and Network Security Perspective By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White Paper was commissioned by Cisco Systems and is distributed

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources

More information

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

How To Manage Log Management

How To Manage Log Management : Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management Prevent cyber attacks. SEE what you are missing. See Your Network MAP. Prevent Cyber Attacks. Driven by the need to support evolving business objectives, enterprise IT infrastructures have grown increasingly

More information

RETHINKING CYBER SECURITY

RETHINKING CYBER SECURITY RETHINKING CYBER SECURITY CHANGING THE BUSINESS CONVERSATION INTRODUCTION Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time,

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Speed Up Incident Response with Actionable Forensic Analytics

Speed Up Incident Response with Actionable Forensic Analytics WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Breaking the Cyber Attack Lifecycle

Breaking the Cyber Attack Lifecycle Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com

More information

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information