IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    
White Paper
Nuix Insight Adaptive Security Brings Context Visibility and Deception to Protect Endpoints
Date: 01/17/2017 Length: 5 pages Cost: $99.00

            Linked In    

Abstract:
When hackers disabled systems and dumped unreleased films, unfinished movie scripts, private emails, salary figures, and tens of thousands of employee social security numbers onto public file sharing sites in December 2014, Sony Pictures became an embodiment of a situation that seemed straight out of one of its movies. While other major corporations faced high-profile attacks, the depth and breadth of the Sony hack, commentators said, would finally force corporations to take a hard look at their own security protocols and layers of protection (or lack thereof). 

Still, daily, there’s another story about attackers stealing credentials and gaining access to everything from sensitive customer data to corporate documents, even to the email accounts of public figures, as we saw with the 2016 U.S. presidential campaign.

What these attacks unequivocally demonstrated is just how exposed our networked society is. They are forcing organizations to confront the reality that we are now in a state of continuous compromise when it comes to cyberattacks. 

Every piece of equipment in the enterprise seems to be vulnerable to cyberattack. The commercialization of the Dark Web provides hackers with a diverse toolkit and evolving tactics, allowing them to gain access to everything from critical systems to BYOD devices and IoT-enabled office equipment. To address this, security architectures can no longer rely on predefined rules and parameters; they must be redesigned to read and react to contextual signals. Robust endpoint security should aim not only to physically protect devices, but act as a digital sleuth and lend clear, actionable data to detect intrusions and insight to prevent similar types of attacks. Organizations that take an adaptive approach to designing security architectures will be equipped to deal with evolving cyber threats.
Author:

David Monahan


 




EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2017 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show