Okay, Breaches Are Inevitable: So Now What Do We Do?

Report this content

IT Connection Blob by Paula Musich

Summary Bullets:  

  • It takes only minutes for a sophisticated attacker to breach an enterprise network, but it can take months to uncover their presence.
  • Reducing that time to discovery can minimize the damage done, but there are multiple ways to try to achieve faster detection.  Which route should you choose?

I had an interesting conversation the other day with a company in the still fairly small market niche called incident response, and it got me thinking about the evolution of the threat landscape and the time that it takes enterprises to respond to new market conditions – especially in the security market.  I think by now most large enterprise security administrators and CISOs understand that it is not a matter of if, but when their organization will experience a breach – one that could  potentially very painful for the whole organization.  But recognizing that sad fact does not help those administrators and executives understand the most effective way to tackle the new challenge presented by more sophisticated, stealthy, multi-stage attacks.  Exacerbating their dilemma is an increasingly porous enterprise perimeter, where computing workloads are shifted outside the traditional DMZ and end users are allowed (or go around policies that prohibit) access to corporate data from their own smartphones, tablets and even laptops. Read more of this post at http://bit.ly/NmW2xH

Media Contact:

Amee Singh
Sr. Director, Marketing Communications
pr@currentanalysis.com 

About IT Connection

IT Connection is the premier source of unbiased analysis and assessments of IT equipment and telecom services.  IT Connection provides easy-to-access, cost-effective, non-vendor-sponsored research to enterprise IT professionals.  The assessments on IT Connection allow you to quickly, easily, and efficiently assess suppliers, access side-by-side product comparisons, determine the best technology solution to fit your needs, and receive real-time updates and analysis on breaking market-changing events.  To join our community and interact with your peers and our analysts, visit us at www.currentanalysis.com/ITC.

About Current Analysis

Current Analysis (http://www.currentanalysis.com) has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business. Current Analysis is the only provider of continuous, in-depth tactical competitive intelligence, analysis, and advice. For more than 15 years, sales teams, product managers, marketing professionals, and executives have relied on Current Analysis as a trusted partner to improve their ability to anticipate and quickly take action on market opportunities and competitive threats. The company serves more than 35,000 professionals at over 1,600 global enterprises.

Tags:

Documents & Links

Quick facts

It takes only minutes for a sophisticated attacker to breach an enterprise network, but it can take months to uncover their presence.
Tweet this
Reducing that time to discovery can minimize the damage done, but there are multiple ways to try to achieve faster detection. Which route should you choose?
Tweet this