Sunday,24 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

Citing Gaps in Visibility, Guidance to Stress Importance of Forensic Security at (ISC)2 SecureDubai

Published Nov 15, 2016

Guidance Software, makers of EnCase®, the gold standard in forensic security, and EnForce, an automated risk management platform, today announced their participation at (ISC)2 SecureDubai 2016 to be held November 22 at the Burjuman Arjaan by Rotana, Dubai. Under the event theme of ‘Securing the Virtual Organization’, Guidance will lead a discussion on how organizations can manage the surface area of digital risk in a virtual world with forensic security.

“Using aviation as an analogy, if airlines promised a 99% safety rate, we are looking at approximately 300,000 crashes a year! You wouldn’t tolerate the 1% failure rate with airlines, so why should you when it comes to the security of your organizations’ most critical assets?” said Fortunato Guarino, Solution Consultant EMEA and Cybercrime & Data Protection Advisor at Guidance Software, who will be leading Guidance’s presentation at the event. “Building on the aviation analogy, Network Protection tools are like airport security, they are getting more advanced, but they aren’t perfect and threats still get through. And when they do, they aren’t easy to uncover. In fact, according to a Verizon Data Breach Investigation Report, 66% of breaches take months or even years to discover, highlighting acute visibility gaps in security defenses.”

Given the multi-dimensional world most organizations operate in, where data is stored in multiple geographic locations, and increasingly spread across varied cloud-based data stores and file-sharing systems, deploying forensic security solutions that give IT teams 360-degree visibility of all critical assets is paramount. Using three use cases, Guidance will highlight how their EnForce™ Risk Manager can help organizations proactively identify, categorize, and remediate private or sensitive data across the enterprise. The solution offers the deepest level of insight and control of electronic data across all endpoints, file shares, servers, and cloud repositories. This enables organizations to improve business intelligence, ensure compliance, and mitigate many types of risks.

“It is no longer a case of if a data breach will occur but rather a question of when. As such, it is imperative for organizations to go beyond just perimeter security solutions and deploy endpoint detection and response tools that identify forensic residue across every stage of the attack cycle and then triage and remediate the threats that will penetrate the network,” concluded Fortunato.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks