
What can we do about it? We can't fully eliminate the possibility of a hack or identity theft or major data breech. Hackers are always a step ahead of all of us. If full prevention and avoidance is basically out of the question, then we need to focus on risk identification, mitigation and response. There are many amazing organizations coming up with software tools and services to help organizations realize safer environments today and tomorrow.
This is not an endorsement of any one service or solution or a ranking by any means. Rather it is a beginning presentation of a few of the enormous amounts of really good solutions and services that are waiting out there to help us prepare for this potential onslaught of hacking, data breeches, and targeted cyberattacks. What I'd like to do today is present a few of those we should all possibly start to consider...
Securonix
SNYPR is a security analytics platform that transforms big data into actionable security intelligence. Developed by Securonix, the market leader in user and entity behavior analytics (UEBA) for cyber security, SNYPR delivers the proven power of Securonix analytics with the speed, scale, and affordable, long-term storage of Hadoop in a single, out-of-the box solution. Put simply, SNYPR is the most sophisticated big data security analytics platform ever built.
What does SNYPR mean for enterprise security?
- A holistic enterprise security analytics platform that marries best-of-breed big data and analytics technologies
- Real-time detection the most sophisticated ad#advanced persistent threats, insider threats, hard-to see and “low and slow” attacks over extended periods of time
- All historical, security-relevant data is available for investigation
Varonis
Varonis provides software solutions that protect company data from insider threats and cyberattacks. Varonis specializes in unstructured data -- file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. This rapidly growing data often contains an enterprise's financial information, product plans, strategic initiatives, intellectual property, and confidential employee, customer or patient records. It is the data that companies tend to have the most of and know the least about in terms of insight into who has access, who does access and when they access those files.
IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behavior analytics, alerting, archiving, search, and file synchronization and sharing. With the rise in ransomware and other malware threats, Varonis solutions protect organizations by ensuring only the right people have access to the right files, monitoring access and flagging potential abuses. So if a user’s files begin encrypting from a ransomware breach, Varonis is able to alert and notify IT in time to prevent or limit the damage.
Mimecast
Mimecast's targeted threat protection with impersonation protection can protect employees from the new breed of email cyberattack. According to the U.S. Federal Bureau of Investigation (FBI), whaling email scams alone were up 270 percent from January to August 2015. The FBI also reported business losses due to whaling of more than $1.2 billion in little over two years, and an additional $800 million in the six months since August 2015.
Whaling attacks are real. And, cybercriminals are becoming more inventive and creative when it comes to compromising organizations. Whaling attacks seek to fraudulently trick employees into making wire or data transfers to the cybercriminal as a way of generating income for organized crime. With Mimecast Targeted Threat Protection with Impersonation Protect, organizations can protect their employees and financial assets from this type of fraud. Impersonation Protect provides instant and complete protection against this new breed of cyberattack by email, which is often malware-less and based entirely on social engineering, thereby able to pass through traditional gateway checks.
Thycotic
Thycotic Secret Server delivers a comprehensive Privileged Account Management solution set to protect your most valuable information assets from cyberattacks and insider threats. Thycotic Secret Server, Application Control, Local Security and Security Analytics solutions protect privileged accounts and enables organizations to enforce least privilege policies for business and administrative users, as well as control applications to reduce the attack surface without halting productivity.
The solution helps organizations revoke everyday local administrator privileges from business users while seamlessly elevating privileges when required by trusted applications. Complementing these privilege controls, the solution also delivers application controls, which are designed to manage and control which applications are permitted to run on endpoints and servers and prevent malicious applications from penetrating the environment.
Trustlook
Trustlook is a global leader in next-generation mobile device security with solutions that find more vulnerabilities sooner than any other to provide the industry's smallest vulnerability window. Trustlook's solutions protect users from both known and zero-day threats by examining over 20,000 new and updated applications every day for malware and malicious behavior.
The innovative Trustlook Antivirus & Mobile Security app available on Google Play protects your Android phone or tablet against malware, harmful viruses, spyware, trojans, phishing attempts and unsafe web browsing. In also includes additional features such as data backup and restore, speed boost, find my device and Identity Check, bringing you a fully featured security solution for Android mobile devices and platforms.
Summary / call for input
Cybersecurity concerns are big and real and are here today and everyday going forward. If you you're a CTO, CIO, CEO, project manager or other and your organization is involved in the tech industry anywhere or in any space or if you are taking on data sensitive projects or initiatives, you need to be aware. Anything and everything can be hacked...it only takes one visit to the Black Hat conference to realize that. I'm not saying that these organizations presented here can solve your problems. Hackers are already working on their next data breech...you can't stop that. But you can take steps – and it starts with organizations, software and services like these presented here. Look to this space for more cyber security options and more cyber crime prevention services to come.