IT Security Needs Less Wall and More Monitoring and Detection

  • TYPE: Workshop DATE: May 10, 2016 TIME: 09:00 - 13:00
Pre-Conference Events

Traditional approaches to IT security are in crisis. At one end of the spectrum they over-control users and constrain business agility. At the other end of the spectrum they fail to prevent data breaches despite ever increasing investments in people and technology. Something is wrong with traditional approaches. The defensive “default-deny” cycle of security where the goal is to prevent access and defend assets can no longer deal with the requirements of megatrends in technology and business.

So IT Security is in crisis. Orthodox solutions are just not built to protect today’s modern business. New ways to protect the organization are required; ones that do not rely on previously knowing threats, but instead operate on the basis of trusting users to do their job, but verify that they have not been compromised, or that they are not abusing that trust.

Businesses can protect against the majority of known threats using current IT security approaches such as static rules and controls. But this has approach has a huge overhead in complex IT situations, and requires building of ever-bigger walls. Even then, protecting against unknown threats is much harder and requires a different approach. Unknown threats may come from APTs, insider access or zero-day attacks. By using machine-learning and real-time understanding of normal user behavior, rather than access controls and pre-defined patterns, it can protect business by identifying and responding to attackers before they can do damage.

Using machine-learning algorithms it maintains a digital footprint of normal user and system behavior. This footprint is then used in real-time to analyze user activity and identify potential threats when a user acts out of context. With security breaches time is critical. The earlier a potential breach can be detected, the sooner it can be resolved and the damage minimized. Data breaches can be prevented.

During this workshop Balabit demo an advanced approach of using user monitoring and behavior analytics together to highlight anomalies within an IT environment.


Organizer

Speakers

Martin Grauel is Presales Engineer at Balabit IT Secuity, an IT security innovator specializing in log management and advanced monitoring technologies. After studying business informatics, Martin has been working in the IT security environment for more than 10 years. Prior to Balabit, he was a...

Márton Illés is Product Evangelist at Balabit being responsible for creating visionary strategies to the company’s products on log management, privileged user monitoring, and user behavior analytics. Márton has been working at Balabit for more than ten years. He...

Ivan is a Lead Analyst with a focus on risk management and identity & access management. He has a deep technical understanding and lengthy experience in security consulting across three continents in a wide number of industry verticals, as well as in government and education.

Stay Connected

Information

Workshop

IT Security Needs Less Wall and More Monitoring and Detection

Language:
English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 10, 2016 09:00 - 13:00 Munich, Germany

Partners

The IT Security Needs Less Wall and More Monitoring and Detection is proud to present our partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00