Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis
- LANGUAGE: English DATE: Tuesday, September 01, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters and overwhelming increase in advanced targeted attacks exploiting known and unknown vulnerabilities, they are more important than ever before. Learn more about the emerging new generation of vulnerability assessment tools, which focus on clear and concise actionable reports instead of raw detection logs, providing considerable time and cost savings for your security team.
Continued deperimeterization of corporate networks in modern “hyperconnected” enterprises and rapidly growing number of complex targeted attacks for purposes of hacking, industrial espionage or government surveillance have led to a sharp increase of the number of data breaches. New, much tighter breach disclosure regulations combined with strong backlash from public make these breaches particularly costly: financial, litigation and reputation losses have increased dramatically.
Even armed with the best traditional security tools, IT experts can no longer keep up with responding to the rapidly growing number of alerts; many organizations simply cannot afford employing a large enough information security team. Demand for better, more intelligent and highly automated tools is therefore growing – and security vendors are coming up with innovative solutions.
The ongoing trend within the information security industry is to migrate away from complex tools aimed at security experts, which tend to generate thousands of unnecessary, often false positive alerts, towards the new generation of solutions aimed at business personnel. These solutions must be able to deliver a small number of clear actionable items ranked by risk score, all accessible via a single centralized management console. Within the vulnerability assessment tools market, one of the key underlying technology enablers for this migration is behavior analysis. Although it requires a great deal more effort for a vendor to implement, it can provide dramatic reduction of false positive alerts and enrich vulnerability reports with valuable actionable context information.
In this webinar you will learn about:
- New challenges IT security experts must face to support their businesses;
- The emerging new generation of vulnerability assessment tools;
- How behavior analysis improves accuracy and reduces the costs for your security team.
In the first part of the webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the new challenges IT security experts must face to support their agile connected businesses. He will talk about the role of proactive defense mechanisms like vulnerability assessment in the organization’s information security strategy.
In the second part of the webinar, Aviram Jenik, CEO at Beyond Security, will dive deeper into the details of the new vulnerability scanning technology based on behavior analysis. He will also talk about customer use cases that demonstrate the benefits of this new approach in real-world scenarios.
19925 Stevens Creek Blvd. • 95014 Cupertino, CA • USA
Beyond Security has established a worldwide reputation as a leading force in the field of security vulnerability testing. Beyond Security's solutions are essential components in the risk management program of many organizations.
Beyond Security's headquarters is located in Cupertino, California. Beyond Security's distributors and resellers can be found in North and South America, Europe, Asia, Africa, the Middle East and Australia
Among our customers are financial institutions, retail, hi-tech, ISPs, information security firms, cellular, telecom and e-commerce companies.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.