Might there be a means to consistently produce high-fidelity alerts that are unmistakably associated with attackers and malicious insiders, which include a comprehensive catalog of the attacker’s system moments, and are triggered in real-time? That, in a nutshell, is the objective of deception, and the focus of this week’s insight. Also included in this insight is a brief description of a deception solution provider that has been making headway in this new security category—Attivo Networks.
Introduction Security analysts tasked with overseeing alert investigations and incident response are inundated with security alerts. The origination of alerts is far from singular in nature as they arise from both internal operations and cyber attackers. In internal operations, the combination of IT hybridization (onpremises and cloud), end users with multiple devices, the Internet of Things, and partner and supplier integrations, contributes to a complex and broadening system of assets, connected devices, and interrelationships. Moreover, this system morass is dynamic. It changes constantly, for a number of legitimate reasons such as revised business requirements, altered circumstances, and the introduction of new applications and technologies. And with change representing deviations from the norm, even if anticipated, the alert pile can still increase in size.
The user community also represents its own slice of uncertainty and non-conformity. In the spirit of attending to business, users veer from their normal routines, and they also cross the boundaries of acceptable practices (e.g., sharing and reusing credentials, and sharing other forms of sensitive information with individuals that are not in the “need to know”). Additionally, they unintentionally, but nevertheless directly, place the business at risk by providing a toehold for malware in internal systems through divulging their credentials when, for example, they are tricked into clicking on dubious email attachments and interacting with questionable Web sites. All combined, operations and user activities add to alert volume. Cyber-attacks, the core focus of security analysts, are the ever-present wild card and a prominent cause for alert generation. Professional attackers, however, are fully aware that deviation-tripping alerts call attention to their activities and potentially put a stop to them. Therefore, they pattern their activities to minimize detection (e.g., proceed slowly) and cozy up to routine operational behaviors.
Even when their activities generate alerts, dressed the same as the crowd of operational- and user- triggered alerts, attackers gain time in the pursuit of their ultimate goal—exfiltrating valuable data. For security analysts, a high volume of alerts, attackers’ activities spread over a lengthy period of time, and undifferentiated alerts challenge their effectiveness and speed to detect and respond.
Our reports have been used by over 10K customers, including:
282 pages •
By The Business Research Company
• Dec 2020
5G Infrastructure Equipment Global Market Opportunities And Strategies To 2030: COVID-19 Growth and Change provides the strategists, marketers and senior management with the critical information they need to assess the global 5G infrastructure equipment market. Description: Where is the largest and fastest growing...
The UK tax software market was valued at US$ 611.3 million in 2019 and is projected to reach US$ 1,331.3 million by 2027; it is expected to grow at a CAGR of 10.5% from 2020 to 2027. Digitalization has encouraged end-user companies in the UK to adopt advanced technologies for reducing manual efforts in business process by implementing automated...
120 pages •
By Infiniti Research Limited
• Dec 2020
Global CRM outsourcing market 2020-2024 The analyst has been monitoring the CRM outsourcing market and it is poised to grow by $ 16.50 bn during 2020-2024 progressing at a CAGR of 4% during the forecast period. Our report on CRM outsourcing market provides a holistic analysis, market size and forecast, trends, growth drivers,...
This study analyzes and forecasts the Japan IoT security product market from 2020 to 2024 after taking into consideration the impact and outlook of the new coronavirus (COVID-19) pandemic as of the end of August 2020. Numerous incidents, such as damage caused by ransomware in IT systems, leakage of personal information, and service interruptions...
The global APT protection market size in the post-COVID-19 scenario is projected to grow from USD 5.2 billion in 2020 to USD 12.6 billion by 2025, at a CAGR of 19.5% during the forecast period. The major factors driving the market include the increasing number of security breaches and advanced cyberattacks such as zero-day exploits, persistent...
This IDC PeerScape examines three best practices for the leveraging of IT to support sustainability policies and goals related to gender equity and diversity in the workplace. It provides concrete examples that should help CIOs identify technology for addressing key challenges related to recruitment, cultural and training, and gender pay gaps....
The augmented reality (AR) market is projected to grow from USD 15.3 billion in 2020 to USD 77.0 billion by 2025; it is expected to grow at a CAGR of 38.1% from 2020 to 2025. The increasing demand for AR devices and applications in healthcare, rising investments in AR market, and growing demand for AR in retail and e-commerce sectors due to...
In-depth Analysis and Data-driven Insights on the Impact of COVID-19 Included in this EMEA Data Center Colocation market report The EMEA data center colocation market by revenue is expected to grow at a CAGR of close to 8% during the period 2019–2025. The EMEA data center market is witnessing a significant boost in investment...
The Asia-Pacific (APAC) secure content management (SCM) market grew by 10.4% year-over-year (YoY) in 2019, declining slightly from 2018. Its top participants’ growth varied because of their different market approaches. The overall email security market is maturing with slowing but steady growth. Heavily driving its cloud-based deployments...
Emerging digital technologies continue to permeate every aspect of businesses and society at large.COVID-19 will have a far-reaching effect on business communities globally. However, this crisis is seen as an inflection point in the drive toward digitization and adoption of emerging technologies across businesses globally. The connected,...
By continuing to use this site you consent to the use of cookies on your device as described in our Cookie Policy unless you have disabled them.
You can change your Cookie Settings at any time but parts of our site will not function correctly without them.