Monday, September 21, 2009

Cyberintelligence Solutions Proven Effective in Mitigating Vulnerabilities Beyond the Border

Cyberintelligence Solutions Proven Effective in Mitigating Vulnerabilities Beyond the Border

While cyberintelligence aimed at the real-time discovery of threats and vulnerabilities has certainly evolved in recent years, the adoption of Data Leakage Prevention (DLP) has been slower than expected despite ever-growing concerns in data security and privacy. Cyberintelligence solutions address the Extended Enterprise (suppliers, partners, agents and remote employees) and provide visibility beyond the border of traditional security measures. While speaking about service differentiators and technical competencies in this emerging space, Vice President and Distinguished Gartner Research Analyst, Avivah Litan, stated that "many more use cases for cyberintelligence have emerged, and the services are now being used to detect and thwart many more types of threats outside the virtual and physical borders of an organization."

Cranberry Township, PA (PRWEB) September 21, 2009 -- In a recent Gartner report (Q&A: Cyberintelligence, 8 July 2009, Author: Avivah Litan) on cyberintelligence, Tiversa (http://www.tiversa.com) was identified as an intelligence and security firm specializing in P2P file transfer monitoring over public networks. While speaking about service differentiators and technical competencies in this emerging space, Vice President and Distinguished Gartner Research Analyst, Avivah Litan, stated that "many more use cases for cyberintelligence have emerged, and the services are now being used to detect and thwart many more types of threats outside the virtual and physical borders of an organization."

So while cyberintelligence aimed at the real-time discovery of threats and vulnerabilities has certainly evolved in recent years, the adoption of Data Leakage Prevention (DLP) has been slower than expected despite ever-growing concerns in data security and privacy. Cyberintelligence solutions address the Extended Enterprise (suppliers, partners, agents and remote employees) and provide visibility beyond the border of traditional security measures.

Highlighted by Tiversa at the August Cloud Security Alliance - Federal Cloud Security Symposium at Mitre in McLean, VA was the fact that the majority of breaches occur outside the corporate perimeter. "When looking at our customer data, we see that more than 90% of disclosures emanate from the Extended Enterprise (http://www.tiversa.com/media/press/2009/2009_01_08_Tiversa-Reinvents-Enterprise-Sec.html)," stated Keith Tagliaferri, Director of Operations at Tiversa, during a panel discussion on new trends in forensic investigation tactics and incident response. Another panelist at the CSA event, David Ostertag, Investigations Manager, Investigative Response, Verizon Business, quickly agreed, saying that, "we also find that most of the breaches we investigate are caused by trusted third parties".

So, as organizations struggle to keep a watchful eye on suppliers, partners and others outside their perimeter, keep in mind that cyberintelligence monitoring solutions, such as P2P threat detection and remediation, anti-phishing services, web monitoring, and counterfeit detection can prove value quickly. "Most enterprises don't begin to fathom its usefulness until after they are hit by an attack that could have been previously spotted on the Internet and, therefore, stopped before any damage was done, stated Litan."

Some best practices outlined in the Gartner Report (http://www.gartner.com) were:

•Broad and deep search and detection capabilities

•Multi-lingual capabilities

•Timely and effective incident response capabilities

•A broad line of services where multiple use cases can be supported

•A strong analytical team

"At less than $150,000 a year (for small-to-midsize implementations), these services can be a bargain if the threats and potential damage unearthed by them are addressed in a timely and responsive fashion," says Litan.

Tiversa provides P2P Intelligence and Security Services to corporations, government agencies and individuals based on patented technologies that can monitor over 450 million users issuing 1.5 billion searches a day. Requiring no software or hardware, Tiversa detects, locates and identifies exposed files in real-time, while assisting in remediation and prevention efforts.

For more information on Tiversa (http://www.tiversa.com/news/), please contact them at (724) 940-9030.

###



Contact Information Scott Harrer

Tiversa, Inc.

http://www.tiversa.com

724-940-9030



No comments:

Post a Comment