www.securityfocuses.com
Complexity in security is growing from all sides, but at the same time, IT teams have to do more with less people – and all without compromising data or the business. We need a new approach – but how do we do this?
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Five Reasons Why Security Needs A Reset
1. FIVE REASONS WHY
SECURITY NEEDS A RESET
w w w. s e c u r i t y f o c u s e s . c o m
12 November 2013
sales@secdata.com
01622 723456
1
2. TIME TO RESET SECURITY
Complexity in security is growing from all sides, but at the same
time, IT teams have to do more with less people – and all
without compromising data or the business. We need a new
approach – but how do we do this?
Growing
complexity
•
•
•
•
The security
landscape
has changed
Sophisticated
attacks
Many more
access points
Different data
sources
Squeeze on
IT depts
•
•
IT budgets
are under
pressure
Security
without
compromise
to
brand, data, c
ommercials
Think
differently
•
•
More
hardware
isn’t solving
the problem
Time to
approach
security in a
different way
2
4. SEE THE WHOLE PICTURE
Visibility across the whole of the infrastructure is the
key to improving security intelligence and taking control
of increasing complexity.
Informed
assessment
Platform
approach
Real time
correlation
Understand the
infrastructure
and gather
intelligence
For visibility you
need a platform
collecting data
from multiple
sources
Real time
monitoring and
correlation is
the foundation
for complete
security
4
6. TECHNOLOGY ≠ INTELLIGENCE
Security intelligence isn’t something you can buy off the
shelf. Complete security goes beyond point technology
solutions to assess risk and detect threats in real-time.
People count
Correlate in
context
Early threat
detection
Intelligence is
the symbiotic
relationship of
security
managed by
bright people
When you have
visibility, expert
contextual
interpretation is
vital for security
Intelligence
creates an early
warning
platform –
beyond typical
threat detection
6
8. PROTECT THROUGH ACTIVE DEFENCE
An end-to-end approach to security will shift security
operations from reactive to proactive. Real-time threat
detection can literally transform risk management and
security effectiveness.
Don’t just
defend
Use your
intelligence
Course of
action
What security
does today is
defend our data
– we want to do
threat mitigation
If we have the
information, we
can proactively
detect and
divert the threat
Don’t wait for
threats – use
analytics to
actively
disrupt, deny &
deceive
adversaries
8
10. AVOID SECURITY INCIDENTS
The best response to a security breach is to do something
about it before the event. Maintaining the intelligence
platform demands continuous expert management.
Maintain your
engine
24x7
intelligence
Security as a
service
More
complex, deeper
technology is
harder to
maintain and
support
Continuous
monitoring and
correlation of
data is
critical, but
tough to deliver
in-house
Push monitoring
data and
analytics to the
cloud and
consume as an
expert service
10
12. MAKE SECURITY BUSINESS-FRIENDLY
It’s not practical to lock down business users, or
prevent access to certain devices or applications, and you
can’t build a perimeter around your data. But your
business still needs to be run securely.
Make security
agile
Add business
value
Time for a
new approach
Abstracted
security
intelligence
enables
business agility
Integrate
security
intelligence into
big data
projects
Assess risk;
detect
threats, protect
valuable assets
and respond in
real-time
12
13. THANK YOU
Attend our event and learn more
about end-to-end security
www.securityfocuses.com
sales@secdata.com :: 01622 723456
13