REACT

How CloudAccess creates unique security value

Learn how  security-as-a-service leader CloudAccess provides both superior integrated solution features and comprehensive service value add to any security initiative including SIEM, log management, Identity and access management, vulnerability scanning, asset management and more. Yet the key to a better night’s sleep is not that an organization employs one or many security solutions, but rather they leverage one another’s capabilities and provide real time correlation and situational context 24/7/365. Like the old proverb, the whole is stronger than the sum of its parts. And that’s

CloudAccess wins prestigious 2015 Red Herring Top 100 Award

SAN DIEGO, CA – June 3, 2015 – Red Herring announced CloudAccess, a leading enterprise security solution developer, as its Top 100 North America award winner during special award ceremony in San Diego. The award was in recognition of CloudAccess’ innovative approach to integrating predictive behavior analytics and cooperative intelligence as the foundation for security. “In 2015, selecting the top achievers was by no means a small feat,” said Alex Vieux, publisher and CEO of Red Herring. “In fact, we had the toughest time in years

SECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud security strategy

Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by applying proactive behavioral analysis intelligence to the end result. They call it SECM: security event correlation management. This is not SIEM and not another marketing ploy to repackage SIEM as some holistic cure-all. SECM, as defined by Forrester, is an adjustment in strategy that continuously monitors and integrates identity and user activity and application intelligence. Although a traditional

Unified Security: Avoid becoming a statistic

Take 3 minutes to learn why this best practice is not only the next evolutionary step in IT security management, but affordable, manageable and more effective than individual point solutions. Unified security from the cloud transforms IT security from reactive collection to proactive and actionable defense while limiting costs and preserving resources.  It leverages the the collective power and intelligence capabilities of SIEM, log management, vulnerability scanning/assessment, Identity management (IDM), access management and single sign on under a single pain of glass…and in real time

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 2)

If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic security initiative, AND  one that seamlessly collaborates with the other components; that shares input across the enterprise so that a clearer understanding of vulnerabilities can lead to effective preventive policies and actions. They say the whole is greater than the sum of its parts. And that is the core of

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 1)

Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an achievable and affordable best practice is that of unified security from the cloud. But if you look across the web, you will no doubt come across various versions of what constitutes “unified,” what is “protected,” and, what is “security from the cloud?” Luckily this means that the concept of unified security from the cloud

Synchronization enforces control for cloud integrated IDaaS and Access Management (SSO)

When Olympic rowers glide across the water’s surface at speeds of more than 25 mph, it’s because all the crew are in synch with one another. It’s a collaborative effort. As appropriate…if you are of a certain age and watched films from in science class and the guy in the lab coat was speaking but his words would burble out a second of two later. Not only is this synch off, but the power of the message of symbiosis is gone too. And in cloud

Maneuvering though the IT Threatscape: A video blog

I was fortunate to receive an invitation to speak at the recent 2013 Credit Union InfoSec Conference in Las Vegas. One of the key drivers for many of the attendees is the burden of compliance and finding ways to remove nagging blindspots due to the creation of technology islands meant to analyze and monitor different aspects of keeping applications secure, data  and account information private, devices inventories and identities properly managed. In my hour long chat, I looked to frame the issues in terms of

Cloud-based SIEM frees that one hand tied behind your back

Have you ever been asked to fight the state boxing champion with one hand tied behind your back? Or metaphorically experience the old adage of bringing a knife to a gunfight? Many security professionals face this scenario every day. For many companies with whom I talk, there isn’t a lack of IT talent when it comes to security–just a lack of hours in the day, computing resources and necessary headcount with specific expertise to change the culture from reactive to proactive and strategic risk management.

Supporting CIO strategies and priorities from the cloud-Part 2

This is the second part of a two-part article entitled Supporting CIO Strategies and Priorities from the Cloud. In case you have not done so, READ PART 1. However, to briefly recap: in support of a recent Gartner study that basically states that the function of the modern CIO is in flux and that his or her future focus must incorporate digital assets (aka cloud-based data and applications) to remain relevant, I have taken their listed priorities and illustrated how they could securely work in