[metaslider id=2951] … Read More
Archives for April 2016
LogRhythm mashes up security and big data to give SMBs better defense in one tool
Security Intelligence Management (SIM) can even the playing field between IT and cybersecurity attackers. Here’s how one of the leaders in the space offers a real-time battle strategy.
A lot of SMBs feel overmatched by the bad guys in cybersecurity. And, for good reason—they are. Most attackers have abundant time to find the latest software vulnerabilities and the best techniques for exploiting weaknesses.
Even companies that have plenty of firewalls, anti-malware, and threat detection still struggle to keep attackers out of their networks% of companies reported that their networks were breached in 2015, according the 2016 Cyberthreat Defense Report.
The problem is that these companies are at a serious intelligence disadvantage.
To fight that, a new breed of security product has emerged in the last few years called “security intelligence management” (SIM). These products use big data—about the methods attackers use to breach networks—and put it to work in targeted ways to identify and respond to potential break-ins as they’re happening.
Timeliness is key, because the average time between a breach and an organization discovering it is 146 days, according to Mandiant’s M-Trends 2016 report.
One of the leaders in the SIM market is LogRhythm, a company I met this week in Orlando at the Midmarket CIO Forum, where their message played well to a crowd of 200 overworked, under-resourced CIOs and CMOs.