LightCyber included in Gartner market guide reports

LightCyber has been listed as a Representative Vendor in two separate, recently published Market Guide reports from Gartner, which advocate the use of broad-based machine learning techniques to detect the anomalous behaviours of active network attackers. The first, published on 8th December 2016, Market Guide for User and Entity Behavioural Analytics (G00292503), includes solutions that profile users and entities to detect anomalies. The second, published on 30th November 2016, Market Guide for Endpoint Detection and Response Solutions (G00298289), includes solutions using endpoint visibility for early identification of attacks.
信息安全的重要性在政府部门,学术机构和工业领域的重要性更加突出。但不幸的是,世界范围内信息泄露的事情时有发生。去年出于某种原因英国就遭遇了几次数据泄露的事故。
“The unique combination of network data analytics augmented by user and endpoint visibility gives the Magna platform a substantial advantage in detecting active network attacks with a high degree of accuracy while producing only a small number of alerts,” said Jason Matlof, executive vice president, LightCyber. “The vendor community is creating a variety of new attack detection solutions that are similar to their incumbent predecessors and that are each biased by a particular technical approach – primarily network-centric, endpoint-centric, or user-centric. We believe the reason that LightCyber Magna has been acknowledged in multiple Gartner reports is due to the increasing recognition of the unique value of solutions that combine multiple data context together into a single analytical solution. We are pleased to receive these acknowledgements.”
Analysts Peter Firstbrook and Neil MacDonald recommend in the Market Guide for Endpoint Detection and Response Solutions that “The most critical EDR capability is the ability to detect sophisticated hidden threats, ideally without requiring the use of externally fed IOCs. The ideal EDR system should be capable of self-detection using its own built-in detection techniques, analytics and behavioural indicators. The range of detection techniques will be also be affected by the type of data gathered. Three realms of data are most valuable: user, endpoint and network events. This data also needs to be put into context with global threat intelligence (that is, attribution and trends). Generally speaking, more information and more context is better than less, assuming it can scale across infrastructure and information management.”
网络信息安全好歌曲

In the Market Guide for User and Entity Behavioural Analytics, analysts Toby Bussa, Avivah Litan and Tricia Phillips recommend “Vendors use packaged analytics to evaluate the activity of users and other entities (hosts, applications, network traffic and data repositories) to discover potential incidents commonly presented as activity that is anomalous to the standard profiles and behaviours of users and entities.”
With the industry average dwell time of approximately five months to discover an active attacker on a network, it is clear that organisations have had little success in stopping a data breach or thwarting theft or damage to critical IT assets. The typical “known bad” security approach of identifying malware through static definitions such as signatures, domains and pre-defined behaviours is no match for sufficiently motivated cybercriminals that will create mechanisms to circumvent those systems, not to mention the fact that those systems are incapable of stopping rogue insiders that already have legitimate credentials on the network. By contrast, Magna uses a “learned good” approach that employs machine learning techniques to profile all user and entity activities, and then detects anomalous activities that are indicative of an active attack.
众多网站存在大量漏洞,很容易将数据库记录外漏,相信这些机构有研发、采购和部署不少安全技术防范产品,甚至有购买安全服务,可是技术和服务最终是要人来使用,显然这些组织机构没能很好解决人员的安全问题。

猜您喜欢

保密意识淡薄带来的危害
三招建立安全意识文化
职业健康、环境保护、安全生产
数万吨辽宁舰在南海能感到明显摇晃原因曝光
ARTIKELQUEEN PAINNECK
安全月安全生产教育动画片——小李的一天