Cyber Security Technologies - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Cyber Security Technologies

Description:

Turns out, it is possible to get the benefits of an integrated, platform approach using the tools you already have. Security automation and orchestration is purpose built to address the technology sprawl that has occurred in cybersecurity over the past several years. Read More - – PowerPoint PPT presentation

Number of Views:12

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Cyber Security Technologies


1
CyberSecurity Technologies
How To Get More Security
2
CyberSecurity Sprawl Struggle
3
Introduction
According to Cisco's 2018 Annual Cybersecurity
Report, 41 of organizations are using
technologies and services from as many as 50
different vendors. Managing this many disparate
security tools and services creates a costly
headache for any enterprise SOC. Put succinctly -
most SOCs aren't getting a great return on the
resource investments they've made.
4
Best-of-Breed vs. Integrated Security Technologies
Within the purchasing process, organizations
ultimately had to make a choice - go for
best-of-breed solutions or choose a single-source
integrated option. While choosing best-of-breed
vs. an integrated option is clearly a
company-by-company choice, it appears we've
reached a tipping point where most SOCs realize
they can't continue down the path of managing
disparate tools as they have been.
5
The More You See,
The More You Miss
Chief among the outcomes of a vast ecosystem of
security tools is a massive amount of alerts
triggered by the various technologies in your
stack. Security operations teams have never had
more data points available to them to identify,
investigate and analyze threats. So many data
points, in fact, that enterprise SOC teams can't
possibly get to them all.
6
Security Automation and Orchestration
Turns out, it is possible to get the benefits of
an integrated, platform approach using the tools
you already have. Security automation and
orchestration is purpose built to address the
technology sprawl that has occurred in
cybersecurity over the past several years.
7
Security Orchestration Platform
A security orchestration platform can enrich
individual alerts with data from across the
environment, grouping related alerts into cases
to combat alert fatigue and give analysts the
context they need to zero in on truly malicious
activity. By providing a unifying fabric,
security orchestration enables security teams to
do more and get more from the best-of-breed
technology investments they've already made.
8
CyberSecurity Operation Center
9
Integrate and Orchestrate
Most cyber security orchestration platforms
enable SOC teams to integrate the dozens of tools
they already use and manage them from one
interface. By providing this unifying fabric and
single pane of glass, analysts are able to
eliminate screen switching and security
operations organizations no longer need experts
in every single technology.
10
Automate Repetitive Tasks
11
Increasing Security Analyst Capacity
Security automation is ideal for these activities
that require a high amount of manual work,
require fast response, happen regularly and
require a significant degree of user involvement.
Automating these items greatly improves security
operations efficiency, freeing up analyst time
for more valuable tasks, increasing analyst
capacity, and ensuring alerts no longer go
uninvestigated.
12
Gain Context and Deeper Insight
13
Conclusion
Security orchestration platforms integrate data
across your entire security operations footprint,
enriching alerts and showing the full scope of
entities, artifacts and relationships impacted by
a threat. Armed with context, security analysts
are equipped to conduct more thorough
investigations, better address related alerts in
a single case and develop insights that lead to
real management of threats.
About PowerShow.com