How to reduce network security cost with "big data"
Source: Internet
Author: User
KeywordsSecurity cost large data
Faced with the rapid renovation of network threats, many enterprises in the security management strategy has "expired risk", in the backward threat early warning mechanism, enterprises are likely to become victims of data leakage. However, on the other hand, in many users who pay attention to risk assessment, although the network security risk has been controlled, but the problem of human cost climbing is generally met. "Security" and "cost" seem to be a pair of irreconcilable contradictions. So, how to effectively prevent the outbreak of cyber security crisis in the case of "no more manpower"? How to make the system easier to come up with the right security strategy in the wider data analysis? WatchGuard that the idea of big data might help.
Today, the scarcity of security professionals is widespread. In a survey of more than 12,000 information security professionals, 56% of respondents said their institutions lacked expertise in cyber security and were struggling to raise funding, according to a report from Frost & Sullivan, a global enterprise growth consultancy.
In New Zealand's capital, Wellington, a service provider that provides users with cloud infrastructure and secure hosting is experiencing this problem. Although information security is increasingly being valued so many customers choose their security services company, as the MSSP security service providers, as well as their customers, they also encounter the problem of "understaffed". The decision makers at the company said that from a security risk perspective, every suspicious log must not be spared, as it is the key to helping customers eliminate threats and ensure quality of service. But the shortage of "understaffed", especially for senior network threat analysts, and the fact that engineers are being dragged down by tedious log-analysis efforts have consumed everyone's energy and severely hampered the company's business growth.
In the process of finding answers, the MSSP chose the dimension solution WatchGuard launched. The new analytics system uses cloud computing [note] and large data technology to easily gain insight into the key points of security threats and trends. The company's technical director said: "Their business unit can be completely open, because the dimension cloud Security Network solution to help the technology sector to achieve intelligent, agile, simplified log analysis, and threat early warning, tracking and analysis capabilities are no longer fully dependent on human resources." and dimension's analysis report has become the business revenue growth point, the automated real-time threat assessment report, as well as the corresponding security strategy proposal, has provided the highest level service for the MSSP customer.
Dimension works in a more efficient and convenient cloud operating environment and uses state-of-the-art large data technology as the underlying support for log analysis. The integration of ideas and technology allows dimension to gain insight into network changes in the first time and recommend more professional security policies for users. Under the guidance of tree-level menu, administrators and decision makers can have "own" data reports, and the efficient excavation is buried in the depths of the network danger zone. In addition, the presentation layer design based on global threat map and reports of over 70 data sets can make the results of threat detection clear, including dynamic dashboards, professional guidance, and good customer practice results.
WatchGuard China market director Wan Yu said: "In a survey we launched with the Slashdot website, the exponential growth of log data has made it impossible for 51% of security professionals to identify suspicious applications in the network at the first time and work on a log management platform with very low visibility. It is even more impossible to locate the source that threatens the core secrets of the enterprise. These make security assessments, threat source tracking, and compliance work harder to start with. And dimension can help users achieve "big" and "fast" in log management and threat analysis.
It is understood that as a world-renowned network and content security solutions provider, WatchGuard launched real-time, visual solutions dimension, with its XTM unified threat management platform to form a more advanced combination of solutions, and in the market presented a series of good feedback. Now dimension has supported more virtualization platforms, such as Mircosoft Hyper-V, outside of VMware, which has set a record high of 23% growth in the 4th quarter of the WatchGuard2013 year.
Today, a new wave of attacks, represented by data theft threats, has arrived, especially for Chinese companies that have recently invested in a torrent of internet business, and the lack of professional cyber-security personnel needs to be complemented by a professional network threat protection system to eliminate the challenges of rising security operating costs. To stop the crisis, companies need to conduct extensive data assessments of information systems health in the most concise and straightforward manner, which is far from the use of random sample analysis. The enthusiastic feedback from dimension foreign mature users fully demonstrates the value of cloud and large data technology in network threat management.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.