Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis

  • LANGUAGE: English DATE: Tuesday, September 01, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars

Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities, they are more important than ever before. Learn more about the emerging new generation of vulnerability assessment tools, which focus on clear and concise actionable reports instead of raw detection logs, providing considerable time and cost savings for your security team.

Continued deperimeterization of corporate networks in modern “hyperconnected” enterprises and rapidly growing number of complex targeted attacks for purposes of hacking, industrial espionage or government surveillance have led to a sharp increase of the number of data breaches. New, much tighter breach disclosure regulations combined with strong backlash from public make these breaches particularly costly: financial, litigation and reputation losses have increased dramatically.

Even armed with the best traditional security tools, IT experts can no longer keep up with responding to the rapidly growing number of alerts; many organizations simply cannot afford employing a large enough information security team. Demand for better, more intelligent and highly automated tools is therefore growing – and security vendors are coming up with innovative solutions.

The ongoing trend within the information security industry is to migrate away from complex tools aimed at security experts, which tend to generate thousands of unnecessary, often false positive alerts, towards the new generation of solutions aimed at business personnel. These solutions must be able to deliver a small number of clear actionable items ranked by risk score, all accessible via a single centralized management console. Within the vulnerability assessment tools market, one of the key underlying technology enablers for this migration is behavior analysis. Although it requires a great deal more effort for a vendor to implement, it can provide dramatic reduction of false positive alerts and enrich vulnerability reports with valuable actionable context information.

In this webinar you will learn about:

  • New challenges IT security experts must face to support their businesses;
  • The emerging new generation of vulnerability assessment tools;
  • How behavior analysis improves accuracy and reduces the costs for your security team.

In the first part of the webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the new challenges IT security experts must face to support their agile connected businesses. He will talk about the role of proactive defense mechanisms like vulnerability assessment in the organization’s information security strategy.

In the second part of the webinar, Aviram Jenik, CEO at Beyond Security, will dive deeper into the details of the new vulnerability scanning technology based on behavior analysis. He will also talk about customer use cases that demonstrate the benefits of this new approach in real-world scenarios.


Platinum Sponsors

Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Aviram Jenik is the co-founder and CEO of Beyond Security, a leading developer of automated security testing tools for networks and applications. He is also the co-founder of SecuriTeam.com, one of the largest security portals and vulnerability databases. Mr. Jenik holds a computer science...


Platinum Sponsor

Beyond Security has established a worldwide reputation as a leading force in the field of security vulnerability testing. Beyond Security's solutions are essential components in the risk management program of many organizations.

Beyond Security's headquarters is located in Cupertino, California. Beyond Security's distributors and resellers can be found in North and South America, Europe, Asia, Africa, the Middle East and Australia

Among our customers are financial institutions, retail, hi-tech, ISPs, information security firms, cellular, telecom and e-commerce companies.

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Beyond Security

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00