FIVE REASONS WHY
SECURITY NEEDS A RESETwww.secur i t y focuses .com
12 November 2013
01622 723456
1
TIME TO RESET SECURITY
Complexity in security is growing from all sides, but at the same time, IT teams have to do more with less people – and all without compromising data or the business. We need a new approach – but how do we do this?
2
Growing complexity
• The security landscape has changed
• Sophisticated attacks
• Many more access points
• Different data sources
Squeeze on IT depts
• IT budgets are under pressure
• Security without compromise to brand, data, commercials
Think differently
• More hardware isn’t solving the problem
• Time to approach security in a different way
Visibility across the whole of the infrastructure is the key to improving security intelligence and taking control of increasing complexity.
4
SEE THE WHOLE PICTURE
Informed assessment
Understand the infrastructure and gather intelligence
Platform approach
For visibility you need a platform collecting data from multiple
sources
Real time correlation
Real time monitoring and correlation is
the foundation for complete
security
Security intelligence isn’t something you can buy off the shelf. Complete security goes beyond point technologysolutions to assess risk and detect threats in real-time.
6
TECHNOLOGY ≠ INTELLIGENCE
People count
Intelligence is the symbiotic relationship of
security managed by bright people
Correlate in context
When you have visibility, expert
contextual interpretation is vital for security
Early threat detection
Intelligence creates an early
warning platform –
beyond typical threat detection
An end-to-end approach to security will shift security operations from reactive to proactive. Real-time threat detection can literally transform risk management and security effectiveness.
8
PROTECT THROUGH ACTIVE DEFENCE
Don’t just defend
What security does today is
defend our data – we want to do threat mitigation
Use your intelligence
If we have the information, we can proactively
detect and divert the threat
Course of action
Don’t wait for threats – use analytics to
actively disrupt, deny &
deceive adversaries
The best response to a security breach is to do something about it before the event. Maintaining the intelligence platform demands continuous expert management.
10
AVOID SECURITY INCIDENTS
Maintain your engine
More complex, deeper
technology is harder to
maintain and support
24x7 intelligenceContinuous
monitoring and correlation of
data is critical, but
tough to deliver in-house
Security as a service
Push monitoring data and
analytics to the cloud and
consume as an expert service
It’s not practical to lock down business users, or prevent access to certain devices or applications, and you can’t build a perimeter around your data. But your business still needs to be run securely.
12
MAKE SECURITY BUSINESS-FRIENDLY
Make security agile
Abstracted security
intelligence enables
business agility
Add business value
Integrate security
intelligence into big data projects
Time for a new approach
Assess risk; detect
threats, protect valuable assets and respond in
real-time
13
THANK YOU
Attend our event and learn more
about end-to-end securitywww.securityfocuses.com
[email protected] :: 01622 723456