siliconindia

Right time for a security management platform

Author: Vijay Basani
CEO & Co-Founder, EIQ networks
Right time for a security management platform -By-Vijay Basani
While the older threats continue to prevail, newer types of sophisticated threats, attacks, and breaches are evolving. In the last 18 months, ID/information related breaches have grown at a rapid pace and people have successfully stolen data from major companies. According to the CSI Research, in the year 2007 targeted attacks have risen up to 18 percent of the over all attacks in the market. That is a major growth since the single-digit growth we had seen previously. Targeted attacks will continue to grow and will be a major worry for enterprise customers, especially large companies.

Irrespective of the size of an organization, every computer that is connected to the network is under attack nowadays. Recent research shows that a computer connected to the internet is attacked once every 30 to 40 seconds. Information theft fetches lot of money in the black market. A credit card with a decent amount of limit will easily fetch $200 to $300 in the black market. For example TJX breach where almost 90 million credit cards were compromised, that can result in hundreds of million of windfall in profit for ID thieves. As long as there is a black market, and miscreants are able to sell and realize significant profit from these kinds of activities, security threats will only continue to rise.

The cyber criminals use a variety of mechanisms to steal data. This just does not happen in an hour or a day, but takes place over a long period of time. Therefore it has become a herculean task for enterprise security teams to identify and prevent these problems, especially since most of the tools they have deployed are not geared towards identifying new types of breaches. They are efficient enough only to identify one piece of the breach but don't really provide the ability to watch the entire process. By looking at only sub-segments of this activity, they are not able to correlate and identify exactly what is happening. The only way to ascertain the activity scrupulously is to use advanced tools that can look at a variety of data in the network, correlate, and analyze to identify pattern and anomalies. The only way one can confidently identify these kinds of breaches is by looking at different data silos or different data sets.

In the current economic environment, companies are tightening their IT budgets. Security teams are asked to do more with less. Companies are asking their network monitoring and security operations teams to collaborate with each other. Just as point solutions were introduced for network management in the past and then evolved into platforms (OpenView, Tivoli and Unicenter) by combining multiple functionalities in a single solution so that customers can gain operational efficiencies, I believe the same thing will happen in the security management space. In the last 8 to 10 years we have seen whole bunch of different types of security solutions being introduced in the network-firewall, IDS, IPS, Spam system, spyware system. Along the way plethora of security management solutions have been introduced. The problem is they are all individually focused solution. When you have a whole plethora of solutions, you are faced with management complexity, inefficiency and increased cost. So I believe the time is ripe for a security and risk management platform.
Previous  article
Next article
 
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
  Cancel
Reader's comments(2)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail (dmary4love1@yahoo.fr) for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: tataosah@yahoo.com
Hello.
My Name is Tata I was impressed when i saw your profile at ww.siliconindia.com and will like you to email me back to my inbox so that i can send you my picture for you to know who i am.i belive we can establishe a long lasting relation ship with you.In addition,i will like you to reply me through my private e mail box (tataosah@yahoo.com).
This is because i dont know the possibilities of
remainning in forum for a long time.
Thanks,waiting to hear from you soonest.
Tata.
Posted by: tata tatababy os - Friday 30th, October 2009
More articles
The retail industry is witnessing an increased migration of customers ... -By-Kaushal Mehta
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
Its 1 AM. Do You Know What Your Offshore Team Is Doing? -By-Samir Shah
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
Disconnect: The Root Of All Execution Evils -By-Raj Karamchedu
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
IT Services Rise Of Tier II Companies -By-Madhavi Vuppalapati
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
DLP, Prevention Is Better Than A Cure -By-Bhaskar Bakthavatsalu
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>