T.E.N. Knowledge Base

Loading

Metro Atlanta ISSA Conference 2012

Corporate Risk and Due Diligence in the Cyber Threat Crosshairs  > Download Whitepaper
Imagine walking into the office tomorrow morning and finding your most critical corporate secrets have suddenly become public domain. Financial information, confidential communication, technical blueprints, everything. Will it flood the market with cheap clones of your most valuable products? Will it derail sensitive business operations, relationships or revenue? Worse, what if critical production processes have been quietly sabotaged, triggering anything from quality problems to environmental disasters and loss of life? While these scenarios may appear extreme, cyber risks have rapidly developed into a major threat for global economies and enterprises. With little notice, cyber threats have reshaped corporate risk profiles and have transformed cyber security from a back-office concern into a foreground corporate priority. Corporate boards and auditors are increasingly zeroing in on cyber risk,1 due to its potential to enhance or destroy financial forecasts, valuation, reputation, compliance and more. Fortunately, new solutions can help the C-suite protect balance sheets, reputation and valuation in an increasingly toxic cyber environment.


REAL-TIME SECURITY ANALYTICS Overview > Download Whitepaper
The network security market needs a breakthrough – a disruptive, revolutionary approach that changes the game against the bad guys. Our solution specifically addresses the widening security risk gap driven by virtualization, consumerization, cloud computing, social media and enterprise mobility. We call it Real-time Security Analytics.


REAL-TIME SECURITY ANALYTICS Technical Whitepaper > Download Whitepaper
In our companion paper, REAL-TIME SECURITY ANALYTICS, An Overview White Paper, we discussed the modern security threat, shortcomings of traditional defense-in-depth products to effectively combat these types of threats, an overview of Click's new solution and some example use cases. This paper briefly revisits the modern security threat, existing product class shortcomings and then focuses on giving the reader strong insight into:

  • The Click engine, Click modules and Click Labs
  • A set of security analyst use cases
  • Real-world case study
  • Terminology explanation that sharpens understanding of our solution differentiation Modern Security Threat

The Value of Predictive Security Intelligence > Download Whitepaper
Ten years ago, Internet worms, e-mail spam and opportunistic hacks were the biggest threats to your corporate network. In response, a stateful inspection firewall, desktop antivirus software and spam filtering could reasonably be expected keep your corporate network protected. Times have changed. Today, attacks against your organization are much more likely to be targeted, stealthy and slow moving. Starting with an initial compromise through targeted e-mail or Web attacks, sophisticated attackers move laterally and quietly within your organization, exploiting employees’ access permissions, misconfigured servers and weakly protected assets to obtain sensitive data, including customer information, financial records and intellectual property.


Corporate Risk and Due Diligence in the Cyber Threat Crosshairs  > Download Whitepaper
Advanced persistent threats (APTs) refer to a category of threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. APTs are often conducted in campaigns—a series of failed and successful attempts over time to get deeper and deeper into a target’s network—and are thus not isolated incidents. In addition, while malware are typically used as attack tools, the real threat is the involvement of human operators who will adapt, adjust, and improve their methods based on the victim’s defenses.


Defending Against Todays Targeted Phishing Attacks  > Download Whitepaper
"Is this email a phish or is it legitimate?" That's the question that employees — and executives in particular — are asking with greater frequency. Is it hyper-paranoia or justified angst? Recent compromises — including those at a federal government laboratory, an email marketing giant, and a leading security technology organization — give credence to the latter, and evidence that hackers have adjusted their phishing attack tactics in ways that get past traditional email security defenses. In fact, although email remains highly vulnerable to foul play, security continues to rely heavily on principles and technologies that are more than a decade old. Organizations need to take a new look at email security, particularly as newer, more targeted phishing attacks proliferate.

Larry Brock

Larry Brock
ISE® Industry Expert
T.E.N.
ISE® Luminary Leadership Award Winner 2009
ISE® North America Commercial Executive Award Finalist 2008

Biography

Responding to Threats Against Intellectual Property > Download Presentation
Intellectual property is the fuel for the economic engine of many global enterprises.  This information is highly desired by competitors and even government organizations to support national economic growth.  Historically, the primary threat to IP loss was from insiders stealing information as they change employers.  Today, some organizations use social engineering tricks, security vulnerabilities and the Internet to steal information.  In this presentation, Mr. Brock will outline the current threats and some of the key practices that a company needs to implement to protect their information.