Enterprise security is guaranteed, and five kinds of automation technologies are “exhibitional”

When it comes to protecting corporate data, we can imagine a picture where the IT leader is on one side of the board and the other on the boat, then watching the boat drift away. Mobile, cloud computing and big data technologies are dragging businesses into unknown waters, while data endpoints are moving away from the control of IT departments.

At the same time, the infrastructure is now barely able to handle existing threats, let alone new threats. IT departments often don't have the manpower or skills to deal with growing security needs.

Frequent corporate security leaks are even more stressful for companies. In 2013, Verizon reported more than 63,000 security incidents and 1367 confirmed data breaches in its annual security breach investigation report. According to the Identity Theft Resource Center, in the first half of this year, about 395 data breaches were reported to US regulators.

Enterprise security is guaranteed, and five kinds of automation technologies are “exhibitional”

“We have broken the periphery of our business,” said Chris Gray, vice president of corporate security and risk at Accuvant, an IT security products and services provider. “We are outsourcing, we are moving everything into the cloud, we are moving around, allowing Mobile access to resources, which we never thought of before." So, he added, "We also opened more doors for attackers, now we don't just look at one location, we need to look at 50 locations, which makes We are facing bigger problems."

But we are not completely in the midst of the gloom. More than 90% of data breaches analyzed at Verizon meet 9 different security models. Security experts say that with the opportunities offered by new technologies, we have a way to balance security risks. Here are five data security technologies worth considering this year.

1. Endpoint Detection and Response Solution

To regain control, companies are considering automated tools that can detect, correct, and even predict safety breaches. Mike Lloyd, chief technology officer at security provider RedSeal Networks, said: "If the company is not staffed enough or has the required talent, or if there are too many access points to monitor, automated tools are very easy to use."

Endpoint Threat Detection and Response tools help businesses continuously protect tablets, phones and laptops from advanced threats. These tools can monitor endpoints and networks, as well as store data in a centralized database. Analytical tools are then used to continually search the database to help improve security posture, divert common attacks, provide early detection of persistent attacks, including internal threats, and respond quickly to these attacks. These tools also help IT security personnel quickly investigate the scope of attacks and block attacks.

Insurance provider Cigna-HealthSpring wants to be more proactive in monitoring the security of its mobile devices. Security and Compliance IT Director [Note] Anthony Mannarino said that in the next two years, the number of iPads and iPhones that the company will issue to employees is likely to double, as the company adds more online applications and provides more reports. Features.

HealthSpring uses Absolute Software's Computrace product to monitor and track employees' mobile devices. The benefits of using this software include "knowing what's on the device and being able to wipe it remotely." The new software feature allows HealthSpring to check the device in real time. He said: "We can build a business area. When the device leaves an area, it will alert you that we can take a proactive approach before the user realizes that the data is lost. ”

2. Sandbox technology

Inevitably, some malware or attackers will still penetrate the security perimeter. To ensure the security of their data in this situation, the easiest thing companies can do is to use sandbox technology, which automatically isolates suspicious malware that has been detected on network devices. Pete Linstrom, an analyst at research firm IDC, said that after malware is isolated, it will be completely away from the active system, and the sandbox tool will run the application and analyze its potential impact. He said: "Monitoring the results of the campaign and finding the malicious things behind the successful implementation is the key to defending against malware."

Special sandbox tools from vendors such as FireEye can do the job, but can be expensive. Other security vendors are adding sandboxing capabilities to existing products. He said: "It is not uncommon for antivirus vendors to add this feature, and most network security vendors also have some sandboxing capabilities."

Cigna-HealthSpring uses FireEye's sandbox application, "They can see the threat and run it in a sandbox environment to see its activity and can stop it," Mannarino said. "If this tool reports that it is Trying to connect to a country's site, we can go into my web filtering technology and make sure we can block these sites." For many companies, the trickiest part might be to understand and analyze the results found by the tool, but There are services that can help you analyze these results. Vendors providing such services include DataHero and ClearStory Data.

Linstrom predicts that sandbox technology will become a standard component in security products two years ago.

Semi-Round Sensor Automatic Dustbin

Stainless Trash Can,Semi-Round Sensor Automatic Dustbin,Semi-Round Series Sensor Dustbin,Semi-Round Sharp Sensor Dustbin

NINGBO ZIXING ELECTRONIC CO.,LTD. , https://www.zixingautobin.com

This entry was posted in on