Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research
telling the right story Confidential © Bloor Research
telling the right story Confidential © Bloor Research 2014 The situation today “It is not if, but when and how often” $ $$$ $ Targeted Sophisticated Well-resourced
telling the right story Confidential © Bloor Research 2014 Today’s security imperative PreventionDetectionResponse
telling the right story Confidential © Bloor Research 2014 Prevention alone is not enough PreventionDetectionResponse
telling the right story Confidential © Bloor Research 2014 Impact of malicious breaches
telling the right story Confidential © Bloor Research 2014 Detection is the new imperative PreventionDetectionResponse
telling the right story Confidential © Bloor Research 2014 Malicious breaches take time to discover
telling the right story Confidential © Bloor Research 2014 From detection to containment
telling the right story Confidential © Bloor Research 2014 Where remediation falls short PreventionDetectionResponse
telling the right story Confidential © Bloor Research 2014 Time taken to resolve a breach
telling the right story Confidential © Bloor Research 2014 The role of security intelligence platforms
telling the right story Confidential © Bloor Research 2014 Most cost-effective security tools
telling the right story Confidential © Bloor Research 2014 Core capabilities Log management and analysis Advanced analytics Continuous monitoring Automated remediation Forensics Actionable intelligence
telling the right story Confidential © Bloor Research 2014 Sample use cases Advanced threat management Compliance management Continuous monitoring Forensic investigation Fraud detection Insider threat detection Monitoring of remote facilities Network behaviour anomaly detection Support for multiple locations Web application defence