Summary:

When just one firewall can create a billion events a day, how can any company analyze the overwhelming amount of data to identify a potential attacker? Join GigaOM Research and ClickSecurity for a free webinar on Feb. 12, 2013.

Cyber Criminal photo

One thing is certain: While traditional security products remain central to protection, by themselves they are not nimble enough to keep up with cybercriminals and hackers. By the time those products analyze events, the damage has been done. By one statistic, 85 percent of the time, hackers only need up to half an hour to get into an organization, either creating damage or stealing. But the damage isn’t usually discovered for weeks and months.

The situation is not hopeless, however. Real-time Security Analytics — big data analysis brought to the security space — can analyze events as they happen and identify a dangerous actor in the network who has just tripped a number of wires (that often go unnoticed) and is intent on inflicting damage.

For more on this emerging technology, join GigaOM Research and our sponsor Click Security for “Real-time security analytics: catching cybercriminals before it’s too late,” a free analyst roundtable webinar on Wednesday, Feb. 12, 2013, at 10 a.m. PT.

Our panel of experts will discuss these topics:

  • How do you look at a set of factors and realize that something is going to occur before it happens?
  • How do you gain visibility to a hacker’s “kill chain” before a damaging event happens?
  • How have virtualization, consumerization, cloud computing, social media and enterprise mobility increased security risk?

Speakers include:

Register here for this free analyst webinar.

Comments have been disabled for this post