Security framework integrates forensics and data auditing
Posted on 07 March 2011.
AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and commercial clients to test drive the solution and provide feedback.

CIRT is the first solution to integrate network forensics, computer forensics and large-scale data auditing into a single interface. Designed for security and response teams, as well as information assurance teams, CIRT allows personnel to analyze what is happening across the enterprise from multiple vantage points.

CIRT enables cyber security personnel to proactively and reactively detect, analyze and remediate security threats in the most efficient manner by correlating network and host data within a single interface. Furthermore, it enables large-scale auditing and the correlation of network and host data, allowing organizations to quickly chase down and remediate classified spillage and files with embedded malware.

Currently, organizations must rely on a variety of disparate tools to respond to incidents, such as advanced persistent threats and classified data leakage. For example, in the case of an advanced persistent threat, the organization may or may not be alerted to the threat by its alerting technologies.

However, if an alerting system catches the incident, the organization must then chase down the malware by investigating both network traffic and data on individual computers across the enterprise. That traditionally requires the use of two or more different tools that do not integrate with each other. This lack of integration makes it extremely difficult to correlate the information and perform root cause analysis, in turn, making it next to impossible to identify all affected computers and thoroughly remediate the threat.

With regard to information assurance, data spillage is often discovered by accident, or in the case of Wikileaks, it is discovered after the classified information has found its way onto a website. Ideally, organizations should conduct regular automated audits of the enterprise to identify whether any documents or emails containing sensitive information have spilled onto an unsecure segment of the network.

Once sensitive content is discovered in unsecure locations, it is critical for an organization to be able to quickly determine root cause, how the spill propagated and how that content is leaving the organization’s enterprise. With an integrated view into computer data and network traffic, an information assurance team can more quickly determine whether a data leakage incident was a hack, an internal employee’s error or a malicious employee’s pet project.





Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //