Page 53 - index
P. 53
Data mining – Statistical analysis, correlation analysis and machine learning are
employed to review historical data to help determine key anomalies and assess whether
a security alert is required.
Multiple access evaluation – Processing the risk that can come with multiple intranet
users, hosts and services allows enterprises to more efficiently and effectively assess
and score harmful attacks.
Early detection – Through robust network behavior analytics, enterprises are able to
premeditate the threat, and are better prepared to mitigate issues in a timely manner.
These built-in intelligence features will further support IT in the overall need for risk analysis
when it comes to catching the unknown in time before it becomes an attack to the network.
With new vulnerabilities continuing to surface and hackers becoming ever-more sophisticated,
enterprises need to acknowledge that there are unknown threats that need to be identified as a
precautionary action to avoid security breaches. By doing, they need to adopt more robust
security measures that provide constant monitoring and data analysis to that are responsive
enough to secure networks from known as well as unanticipated threats.
Customers look for solutions that address a full set of network and security issues and typically
don’t have the resources nor budget to purchase multiple products and management tools.
For example, Garratt-Callahan, a company with more than 275 employees and five offices
located throughout the U.S. that delivers water treatment products and services facilities
nationally, required a fast and reliable security solution to detect both unknown and known
threats on the network. After deploying an intelligent next generation firewall, Garratt-Callahan
improved network performance by reducing employee sign-on delays by as much as 15
minutes, and eliminated web application delays by 45 minutes. As a result, Garratt-Callahan
benefitted from:
Granular reporting for broader and deeper visibility into network traffic at the perimeter,
including the type of attacks, the times and dates of attacks, as well as the originating
source of attack
Ease of administration and implementation of security policies
Support bandwidth for a mobile ordering application
Increased anti-virus depth level for increased, proactive protection
Companies like Garratt-Callahan look for solutions to address a full set of network and security
issues, and typically don’t have the resources nor budget to purchase multiple products and
management tools. A Next-Generation Firewall is not enough, but implementing a layer of built-
in intelligence provides high-performance solutions as well as deep visibility to applications and
bandwidth usage to effectively help customers like Garratt-Callahan defend against network
attacks.
I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945