background image
data breaches create fear within
organisations and as a result,
everything about an organisation's
security strategy has always been
focused on stopping breaches from
happening.
The inconvenient truth is that breaches continue to happen. in fact, data
breaches are becoming frequent and increasing in severity, and therefore
we must accept that it is not a case of if a business will suffer a data
breach as a result of a cyber attack, but simply when.
breaches can be malicious or non-malicious but whatever the intent,
any exposure or theft of business data, operational disruption or the
`brand impact' is extremely costly. As a result, organisations are finding it
increasingly difficult to invest in preventative measures, and still continue
to be challenged around the post-breach scenario. With the volume of
attacks causing a big data problem, it is left to un-skilled employees to
address the issues but still no one to clear up after the attack has taken
place. Unfortunately, this is allowing response times to be too long and
insufficient resources are delaying the appropriate remediation. It seems
that little effort is left to complete a forensic study, or develop the
regulatory/compliance reports, and managed mitigation is a fantasy.
This has been the impetus for CARM (Cyber, Attack, Remediation and
mitigation), a platform capable of addressing the post breach issues
organisations face following a successful cyber attack. CARM adds
reaction to your existing detection and protection topologies. by
implementing a process of detection, identification and remediation,
CARM downgrades successful attacks into known threats.
by combining the best of breed capabilities of numerous vendors such as
LogRhythm, Infoblox, FireEye, Palo Alto Networks, Bit9, Imperva, Mandiant
and Fortinet, CARM helps address the key issues facing CISOs; lack of
visibility, volume of incidents, classification of incidents, time to detect,
time to contain and ultimately the minimisation of the attack's impact.
The real beauty of CARM is its flexibility to integrate even further with
existing legacy vendor technology already deployed. Whether that's
firewalls, IPS, anti-malware etc., this means existing investments are not
dead. Carm does not `rip and replace' but instead leverages previous
investments which were designed for prevention purposes, to deliver a
post-breach solution. and with Carm available to demonstrate as a live
working platform, organisations can trial and build various scenarios to
test the automation and rapid remediation benefits.
- Quicker response, lower breach impact
- Better, more isolated breach fixes by virtue of its early warning system
- Easier, faster breach notification and forensics in spite of big data
- Fewer IT hours, no human error thanks to maximum automation
- remediation learning eliminates repeat threats
- Significantly more cost effective than adopting multiple technologies
through any other model
It seems that little effort is left
to complete a forensic study, or
develop the regulatory/compliance
reports, and managed mitigation
is a fantasy.
· 42 ·
a d v e r T o r i a l