Download presentation
Presentation is loading. Please wait.
Published byAdrian Crow Modified over 10 years ago
1
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research
2
telling the right story Confidential © Bloor Research 2014 http://www.logrhythm.com/resources/resource-library/analyst-reports.aspx
3
telling the right story Confidential © Bloor Research 2014 The situation today “It is not if, but when and how often” $ $$$ $ Targeted Sophisticated Well-resourced
4
telling the right story Confidential © Bloor Research 2014 Today’s security imperative PreventionDetectionResponse
5
telling the right story Confidential © Bloor Research 2014 Prevention alone is not enough PreventionDetectionResponse
6
telling the right story Confidential © Bloor Research 2014 Impact of malicious breaches
7
telling the right story Confidential © Bloor Research 2014 Detection is the new imperative PreventionDetectionResponse
8
telling the right story Confidential © Bloor Research 2014 Malicious breaches take time to discover
9
telling the right story Confidential © Bloor Research 2014 From detection to containment
10
telling the right story Confidential © Bloor Research 2014 Where remediation falls short PreventionDetectionResponse
11
telling the right story Confidential © Bloor Research 2014 Time taken to resolve a breach
12
telling the right story Confidential © Bloor Research 2014 The role of security intelligence platforms
13
telling the right story Confidential © Bloor Research 2014 Most cost-effective security tools
14
telling the right story Confidential © Bloor Research 2014 Core capabilities Log management and analysis Advanced analytics Continuous monitoring Automated remediation Forensics Actionable intelligence
15
telling the right story Confidential © Bloor Research 2014 Sample use cases Advanced threat management Compliance management Continuous monitoring Forensic investigation Fraud detection Insider threat detection Monitoring of remote facilities Network behaviour anomaly detection Support for multiple locations Web application defence
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.