Page 43 - CDM-Cyber-Warnings-March-2014
P. 43
With network behavioral analysis and visualization, security analysts can take a look at the behavior in their network and search through that visual landscape using security analytics. As a result, analysts gain the intelligence needed to get to the root of malicious activity to identify and mitigate previously undiscovered threats, and are empowered to make decisions faster and with more confidence. They’re not just responding to an alert, they’re visualizing the context around them. The era of sitting and waiting for alerts is over. Organizations need to empower their security teams to take an alert and run it to ground by fusing different data sources and visually finding not only how it happened, but why, and who was affected. This involves empowering them with solutions that reward their curiosity, enabling them to test out hunches, research network behavior patterns, and hunt down things that may not trigger an alert. With advanced network behavior analysis and visualization solutions, they can do this with no additional training, no special certifications, and no advanced degrees in data science. The era of SIEM is not ending, it’s evolving as we realize as a security community that what we were doing is not enough, and it never will be, but we can no longer afford to accept the limitations of the status quo when better options are available. Mike Hamilton is the Director of Technical Marketing at 21CT. In this role he works closely with customers and prospects to understand their network security challenges and develops solutions that leverage analytics and visualization. Previously, Mike was with BreakingPoint Systems (acquired by IXIA) as Director of Systems Engineering. He has an MBA from the University of Texas at Austin and is a frequent speaker on security topics. " # % " $ " # ! !