Finding Nirvana: Preventing Threats vs Disrupting Business

Posted by Boris Danilovich on Sep 15, 2016 11:41:29 AM

As Benjamin Franklin once said “An ounce of prevention is worth a pound of cure.” As Enterprises continue to build out and reinforce their IT security strategy, a keen eye is being put toward “preventative” solutions. With the rise in insider threats and compromised credentials, this is no surprise.

Read More

Topics: Insider Threats, Security Skills, Multi-factor Authentication

Enterprise Security in Times of War

Posted by Ajit Sancheti on Sep 8, 2016 7:58:18 AM

Enterprises define security policies that match their business objectives. By setting security policy rules, an organization can better enable the business to achieve its goals while protecting them from advanced threats. They work reasonably well, even allowing for the well publicized breaches and insider threats. Without policies or a set of tools in place for such eventualities, it will be very difficult for the business to operate effectively when under attack.

Read More

Topics: CISO, Behavioral Firewall, Adaptive Response, Insider Threats, User and Entity Behavior Analytics, Credential Compromise, ueba

Could Sage Have Acted More Sagely Before The Insider Breach?

Posted by Heather Howland on Aug 16, 2016 9:00:00 AM

This weekend, Sage Group sent out a warning to its customers about a data breach. According to the BBC, the breach exposed the personal details of employees at close to 300 companies in the UK and Ireland.

Read More

Topics: Insider Threats, User and Entity Behavior Analytics, Credential Compromise

Crunchy on the Outside, Chewy on the Inside - Eliminating Insider Threats

Posted by Kowsik Guruswamy on Jul 14, 2016 11:01:10 AM

Sixteen years ago, when we set out to build the first commercial inline Intrusion Prevention System (IPS), the OneSecure IDP, there was a lot of consternation and concern that deploying a solution inline would never happen on enterprise networks. Fast forward to now. We have multiple successful companies like Palo Alto Networks, Fortinet, SourceFire, and others. that have integrated IPS technologies into their NG Firewalls.

Read More

Topics: Insider Threats