Despite significant investments in the latest preventative security technologies, organizations continue to suffer devastating security breaches. And, attacks are not limited to just the big companies, smaller organizations are facing the same threats. If even the largest companies are struggling to avoid breaches, how can smaller teams with more limited security staff and budgets hope to avoid that same fate?
Join Fran Howarth of Bloor Research and Patrick Bedwell, VP of Product Marketing at AlienVault for this session covering:
Developments in the threat landscape driving a shift from preventative to detective controls
Essential security controls needed to defend against modern threats
Fundamentals for evaluating a security approach that will work for you
How a unified approach to security visibility can improve threat detection
20. OTX + AlienVault Labs
Threat Intelligence Powered by Open Collaboration
21. Now for some Q&A…
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site
Questions?
hello@alienvault.com
Twitter: @alienvault
Hinweis der Redaktion
\
Integrated approach to threat intel
Comprised of OTX (data from 140+ countries) and the independent research from our AlienVault Labs’ team
we’re analyzing over 500.000 malware samples per day
Users submitting an average of ~11 million per month (365,000 a day)
Updated every 30 minutes
the ability to quickly convert data into actionable information
So you can call out those truly significant events to help you prioritize your efforts
reduce the need for in-house expertise.
------
OTX derives its data from three primary sources: USM and OSSIM that systems that enable OTX sharing, external feeds from public researchers and partners, and the research from our alienvault
labs team.
- This data is automatically analyzed through a powerful discovery engine that is able to granularly analyze the nature of the threat, and a similarly powerful validation engine
that continually curates the database and certifies the validity of those threats.
Crowd-sourced information remains the core focus of OTX. OTX derives information from normalized an anonymous event logs: firewalls, content filters, ips/ids logs, etc. We receive approximately 17,000 contributions daily from over 140+ countries.
-I want to make something clear: OTX's information is anonymous and normalized. OTX does not analyze your data or do anything that would identify you,
we are solely focused on analyzing the nature of the threat jeopardizing your system.
OTX derives a significant amount of data from the security community. We work with public research institutions, government organizations, and private companies and partners to
share and analyze threat data. With over 50+ partners working with us on OTX, if you look around Blackhat you're likely to see some of our partners.
- AlienVault labs research is also a critical part of our analysis. Our labs team generates novel research on high profile threats, as well as instrumenting the automatic analysis for discovering
and certifying all threats coming from OTX partners and OSSIM and USM customers who opt in to share data.