When just one firewall can create a billion events a day, how can any company analyze the overwhelming amount of data to identify a potential attacker? One thing is certain; while traditional security products remain central to protection, by themselves, they are not nimble enough to keep up with cybercriminals and hackers. By the time those products analyze events, the damage has been done. By one statistic, 85% of the time, hackers only need up to a half hour to get into an organization, either creating damage or stealing. But, the damage isn’t usually discovered for weeks and months.
The situation is not hopeless, however. Real-time Security Analytics – big data analysis brought to the security space – can analyze events as they happen and identify a dangerous actor in the network who has just tripped a number of wires (that often go unnoticed) and is intent on inflicting damage.
For more on this emerging technology, join Gigaom Research and our sponsor Click Security for “Real-time security analytics: catching cyber criminals before it’s too late,” a free analyst roundtable webinar originally live on Tuesday, February 12, 2013 at 10 a.m. PT.
What Was Discussed
- How do you look at a set of factors and realize that something is going to occur before it happens?
- How do you gain visibility to a hacker’s “kill chain” before a damaging event happens?
- How have virtualization, consumerization, cloud computing, social media, and enterprise mobility increased security risk?
Who should attend
- C-level execs
- Data managers/developers
- IT decision makers
- Business strategists and decision makers