Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Time to resolve security attacks of significant concern

Guidance Software : 19 September, 2013  (Technical Article)
Survey from forensics specialist Guidance Software shows that a third of IT security professionals believe the time to resolve attacks to be the number one concern
Time to resolve security attacks of significant concern
Guidance Software has released the results of a survey conducted during the 13th annual Computer and Enterprise Investigations Conference (CEIC), hosted by Guidance Software in May. With respondents representing more than 150 organizations participating in the survey, the results indicate shifting priorities in enterprise and government security teams, with “length of time to resolve attacks” coming in as the chief cybersecurity concern. In response to the question, “What is your biggest cybersecurity concern?” 33 percent of respondents answered, “length of time it takes to resolve attacks,” an increase from 25 percent of respondents last year. As organizations are faced with an increasing risk of data theft, escalating response costs and damage to their reputation, one of their chief concerns today is the damage caused by allowing a threat to remain either undetected or unresolved. Security teams are beginning to operate under the assumption that their organizations are already compromised. They are becoming increasingly aware that the longer a threat lurks unidentified in their environment, the greater the exposure, loss of productivity, impact on revenue and expense of remediation for the organization. To reduce the time it takes to identify and respond to threats, they replace outdated incident response methods that usually involve home-grown tools coupled with manual investigation by security analysts, with automated detection and incident response products such as Guidance Software’s EnCase® Cybersecurity and EnCase® Analytics products. EnCase Cybersecurity and EnCase Analytics help organizations reduce the gap between detecting an incident and mobilizing a rapid response. Through integration with leading Security Information and Event Management (SIEM) vendors, including HP ArcSight, EnCase Cybersecurity automates critical time-sensitive aspects of the incident response process, reducing response and remediation time to a matter of minutes or hours, from days or weeks. EnCase Analytics empowers customers to find and expose cyber threats hiding behind complex relationships in the massive amounts of data that exist within the sum of all endpoints of an enterprise. BYOD Crackdown: The percentage of companies allowing employees to use their own devices for work purposes dropped sharply year over year. Just over half (51 percent) of the CEIC Survey respondents this year said their companies allow employees to use their own devices to do work, either in accordance with an official bring your own device or BYOD policy or as a casual rule of thumb, compared to 78 percent last year. Thirty-two percent of respondents said their companies ban non-company devices to do work, which was up from 22 percent in 2012. The concerns driven by the assumption of compromise are further aggravated by the reality of a “vanishing perimeter.” Encouraged by liberal BYOD policies, employees are bringing their own devices to work, equipped with non-standard applications and personal data. Often these devices lack adequate security measures specific to a BYOD approach. As a consequence, what was previously understood by security teams as the “enterprise perimeter” has begun to dissipate and, at times, completely vanish. The CEIC Survey results demonstrate that security organizations are increasingly concerned over their ability to adequately protect the vanishing perimeter using traditional security methods and require a new approach to meet this challenge. Guidance Software’s EnCase products enable companies to better manage the risk of the vanishing perimeter by allowing security analysts to include mobile device data in their digital investigations. "Enterprise and government security teams are seeking better solutions to attack new threats of increasing complexity and persistence,” said Alex Andrianopoulos, vice president of marketing at Guidance Software. “Our security products, EnCase Cybersecurity and EnCase Analytics, leverage our rich heritage in digital forensics in conjunction with new investigative techniques based on big data analytics, empowering our customers to uncover and stem security breaches, such as APTs and other previously unidentified threats.” EnCase Cybersecurity is ArcSight Action Certified to automatically respond to events correlated by ArcSight ESM, greatly reducing the length of time to resolve attacks. Guidance Software is a Gold HP Partner and a Platinum sponsor of the HP Protect conference being held in Washington, DC, September 16 - 18, 2013.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo