Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Are SIEM’s Enough?

2015/01/30 by admin

If you are like most companies today, you have followed all the steps to ensure compliance with the myriad of regulations - SOX, PCI DSS, HIPAA, to name a few: Firewall in place, AntiVirus Deployed, Network Segmented, IDS/IPS, with the logs being sent to an SIEM/SIM/SEM. You are capturing event data from systems (Windows, Linux, Applications, etc) and sending that information as well. Reports have been created, and alerts setup for any unusual behaviour. So why according to Verizon Data Breach Report are the number of incidents/breaches climbing every year. In addition, according to the 2014 Cyberthreat Defense Report, by the CyberEdge Group, 60% of respondents were affected by a successful cyberattack in 2013.

Reviewing logs (10 years ago) was the best way to see what was occurring on your network, and for the most part were extremely successful, a jump in activity on a device indicated a form of malware/trojan/virus. So what has changed?

  • Increased sophistication of threats.
  • Proliferation of devices and applications
  • Rise of Social Media
  • Inadequate Data Collection
  • Data overload
  • Over normalization
  • Siloed information and processes.

Organizations are collecting data from a variety of data sources, or trying to, and then create complex queries to generate reports. The problem lies in the fact that you are collecting log data for a compliance regulation,not necessarily for security. Being compliant does not equate to being secured. Log Management truly assist with forensics - after the breach - but most do not assist with predicting or providing Security Analytics. In order to have security intelligence and therefore have anomaly detection, you need historical data to create a more effective baseline of average activity by either the user or the computer (asset), and for most SIEM/SEM/SIM’s the more data collected, the slower they will perform. By utilizing a Data Analytics platform, to augment your SIEM/SEM/SIM, additional alerts can be generated on activity that deviates by specific thresholds, and can be investigated immediately. Allowing a machine to “learn” the habits of the organization will eliminate human error. Have a look at the whitepaper by our partner Hexis Cyber Solutions - Why SIEM’s Are Not Enough,or review the HawkEye AP .

Contact us for web demonstration of the product.

Filed Under: Advanced Persistent Threat, compliance, Hexis, industry, Log Management, Malware, PCI, Security News

NetBeat Nac select as Readers Trust Finalist in Best NAC Solution

2015/01/21 by admin

SC Awards 2015 -
Tuesday, January 20, 2015

HANOVER, Md., January 20, 2015– Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ: KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, has been selected as a Readers Trust Award finalist in the Best NAC Solution category for the SC Awards 2015. To become a finalist, NetBeat NAC was selected by a panel representing the readership of SC Magazine as one of the best-in-class security products and services. The winner will be announced at the SC Awards 2015 ceremony to be held on April 21, 2015 in San Francisco.

“From Home Depot to JP Morgan to Sony, cyber attackers showed new levels of sophistication and determination in their attacks in 2014,” said Illena Armstrong, VP, editorial, SC Magazine. “With mounting headlines, it’s more important than ever to recognize the tireless efforts of the men and women across the globe who work to combat these threats and provide cybersecurity to organizations large and small.”

The SC Awards, now in its 18th year, are the information security industry’s most prominent recognition for cybersecurity professionals, products and services. With the awards, SC Magazine recognizes the achievements of security professionals in the field, the innovations happening in the vendor and service provider communities, and the vigilant work of government, commercial and nonprofit entities.

“We are honored to be recognized by SC Magazine’s readers as providing one of the best network access control solutions on the market,” said Chris Fedde, president, Hexis Cyber Solutions. “Our goal in creating NetBeat NAC was to offer a next-generation solution that not only provides companies comprehensive visibility and access control across their networks, but is also simple to deploy and manage while remaining cost-effective. Being selected as a finalist for this award is further proof that our solution provides companies a critical step forward in a proactive approach to better IT security.”

Vendors and service providers who offer a product and/or service for the commercial, government, educational, nonprofit or other industries are eligible for the SC Awards’ Reader Trust Award category. A panel representing a cross-section of SC Magazine’s readership from large, medium and small enterprises from all major vertical markets, selected NetBeat NAC from the hundreds of entries submitted across multiple technology categories.

“Functionality, manageability, ease of-use and scalability are hallmarks of the Readers Trust Award finalists,” said Illena Armstrong, VP, editorial, SC Magazine. “We are proud to recognize Hexis Cyber Solutions for their contributions to the cybersecurity industry and look forward to revealing the winners at the SC Awards Ceremony.”

Winners of this year’s SC Awards U.S. will be announced at a gala dinner and award ceremony to be held in San Francisco on April 21, 2015. This is one of the most anticipated IT security events of the year and promises excitement and invaluable networking opportunities with some of the top corporate IT professionals in the country.

About SC Magazine

SC Magazine provides IT security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders and the best, most extensive collection of product reviews in the business. By offering a consolidated view of IT security through independent product tests and well-researched editorial content that provides the contextual backdrop for how these IT security tools will address larger demands put on businesses today, SC Magazine enables IT security pros to make the right security decisions for their companies. Besides the monthly print magazine, special Spotlight editions and daily website, the brand’s portfolio includes the SC Congress and Expo series (New York, Chicago, Toronto, London), SC Awards, SC Marketscope and SC Magazine Newswire.

Filed Under: Advanced Persistent Threat, byod, compliance, Hexis, industry, Network Access Control, Products, Security News

  • « Previous Page
  • 1
  • 2
  • 3
  • 4

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement