The known threats, true to their name, are tracked by their known and readily available signatures and are typically stopped by perimeter security solutions such as antivirus software, firewalls, or SIEM (security information and event management) systems. While these tools are necessary and can be effective at stopping known threats, the unknown threats--the ones with no defined modi operandi or signatures--remain at large within organizations, lurking undetected, waiting for the right moment to strike. Sometimes, these threats can even be a careless or disgruntled employee.
So how can we get to know these unknown threats and expose
the risks they are imposing on the organization? Such a task can only be
achieved by having multidimensional visibility into the entire organization.
And EnCase®Analytics has got it all.
GO WIDE to view the entire breadth of the
organization’s endpoints. Historically, due to resource constraints,
scientists have to be mindful of the sample sizes to ensure that the tests
performed can provide statistically significant results. But isn’t there
greater potential in looking at the entire population for a holistic
assessment, if we can do so easily and quickly? EnCase Analytics
marries its expertise in obtaining endpoint data with easy-to-understand
visualization technology to allow the widest possible view of enterprise-wide
endpoints quickly and efficiently.
GO DEEP into the kernel. To gain
intelligence and insights into the organization’s security posture, solutions
on the market use data sources ranging from machine logs, network packets, or
even end-user activities to perform Big Data analytics. Yet none but EnCase Analytics
goes so deep as to the kernel level to get data such as encrypted data,
slack space, registry, RAM, etc.--data that are extremely difficult to obtain.
Yet we insist on capturing data from the kernel level so as to avoid false
information provided by already compromised operating systems. This is a
differentiator well described by enterprise security analyst Javvad Malik in
his recent 451 Research Impact Report: Guidance EnCaseAnalytics, where big data meets digital investigations, “Guidance believes that
where it differs and can add value is . . . it drills into the kernel level and
exposes previously dark parts of the endpoint.”
GO BACK in time and
provide continuous intelligence through time. How do you spot an anomaly
when you don’t know what “normal” is? One of the critical dimensions of
security intelligence is to be able to baseline the activities over a period of
time. Cases such as sudden spikes of unique processes running across the
endpoints is something that requires further investigation, but it would not be
visible as an anomalous behavior unless it is tracked through time.
So
EnCase Analytics captures data from all the endpoints, down to the kernel
level, throughout the entire duration of time. The key, however, is in using
all these endpoint data to enable organizations to…
GO PROACTIVE and move
beyond reactive. In the June 3rd blog entry, Hello?You’ve Been Breached, my colleague AleEspinosa described beautifully the state of today’s security intelligence
landscape and how “70% of cyber breaches go completely undetected by
organizations’ security teams, and are instead discovered by external parties
like the authorities, FBI, or even the attackers themselves.” Revenue and time
losses aside, such publicly known cyber breaches also have a huge impact on the
organization’s reputation and brand image. As a critical last piece of the
security game plan, organizations can use all the data captured and presented via an interactive
visualize interface by EnCase Analytics to proactively scout out the telltale signs of threats,
even if the threats were created by the organization’s own careless or
out-of-policy employees.
With EnCase Analytics,
organizations can not only learn more about themselves with complete visibility
to all the endpoints, but also know and identify their cyber enemies. EnCase Analytics
is a comprehensive security intelligence game plan to victory in this war
against cyber threats.
To learn more about EnCase®Analytics
and how it can help you stay on top of your systems’ security, visit http://www.guidancesoftware.com/encase-analytics.htm.
No comments :
Post a Comment