Tag: SIEM

Enterprise Security Magazine: Enabling a Holistic View of Security

This is a reprinted article from June 2018 edition of Enterprise Security Magazine. You can see the electronic version of this issue HERE The cloud-based security industry is exploding as businesses are moving their assets to the cloud. In the thick of this, the security aspect, which was deemed as an afterthought in the past, has matured as forethought to prevent vulnerabilities. “As companies move their assets to the cloud, the formula completely changes, making security paramount. However, the missing link is the core competency,

CloudAccess Named Amongst “Top 10 SIEM Solution Providers 2018” by Enterprise Security Magazine

FREMONT, CA—CloudAccess announced today that it has been selected as one of the “Top 10 SIEM Solution Providers 2018” by Enterprise Security Magazine. A distinguished panel of experts, professionals, and technology leaders including board members of Enterprise Security Magazine has chosen and included CloudAccess in the Top 10 list. “We take pride in honoring CloudAccess as one among the 10 companies that are featured in the SIEM Special Edition,” said Michael Brown, Managing Editor of Enterprise Security Magazine. “CloudAccess provides comprehensive state-of-the art security-as-a-service from

Evening the Odds

This is not a rant to prove how dangerous the IT business landscape has become. We all know the bad guys are getting bolder and smarter, the stakes are higher and the line between security and sacrifice are nearly transparent. Every IT and security professional are well aware of the risks and work hard at preventing breaches, leaks, intrusions and hacks. But, for a variety of reasons (from budget to headcount to lack of C-level support to tool limitations) it seems that the odds are

SECM vs SIEM—not more alphabet soup, but new proactive, integrated cloud security strategy

Forrester Research’s recent white paper, called Security’s Cloud Revolution identified a new generation of protection best practices that expands the boundaries of traditional IT security solutions by applying proactive behavioral analysis intelligence to the end result. They call it SECM: security event correlation management. This is not SIEM and not another marketing ploy to repackage SIEM as some holistic cure-all. SECM, as defined by Forrester, is an adjustment in strategy that continuously monitors and integrates identity and user activity and application intelligence. Although a traditional

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 2)

If you missed Part 1: read it HERE More than security from the cloud, the concept of unified security takes the method another step forward in terms of best practices—the ability to deploy a holistic security initiative, AND  one that seamlessly collaborates with the other components; that shares input across the enterprise so that a clearer understanding of vulnerabilities can lead to effective preventive policies and actions. They say the whole is greater than the sum of its parts. And that is the core of

Analyzing the Top 10 benefits of Unified Security from the cloud (Part 1)

Of all the strategies and tactics available to prevent breaches, deter data leakage and theft, control access and secure beyond the so-called network perimeter, the one that is emerging as an achievable and affordable best practice is that of unified security from the cloud. But if you look across the web, you will no doubt come across various versions of what constitutes “unified,” what is “protected,” and, what is “security from the cloud?” Luckily this means that the concept of unified security from the cloud

Beyond building houses, homebuilders faced with IT security challenges too

Just as home builders across the country install state of the art security and anti-theft devices in many of the beautiful new homes they build, this consideration must extend to the personal and financial information of its homeowner customers stored on its or its subsidiaries servers. Because pre-loan and mortgage applications loan digs deeper into a person’s financial life than any other commercial form, it holds a treasure trove of information for hackers. Top 10 builder D.R. Horton found this out first hand last year.

What retailer BCBGMAXAZRIA learned about cloud security, SIEM

The following is an excerpt of the recently released case study on how a major retailer, BCBG, migrated to a cloud security platform and discovered how SIEM and Log Management capabilities enhanced their abilities for enterprise security. For the entire case study, you may download a PDF version here. There was a time the only security issues retailers needed to be concerned with was theft. Put a guard in the store and a couple of video cameras and prevent as much loss as possible. Those

Law firms in the security cross-hairs: how cloud security can level the playing field.

“Law firms are a back door to clients’ confidential information,” Business Week. As corporations have become more aware of threats to data, hackers and other fraudsters are quickly discovering a new, softer target to attack and siphon highly confidential corporate details, proprietary personal information, and trade secrets. Even as stewards of trust for their corporate and private clients, law firms have traditionally been slow to embrace new technologies. Cloud computing has been no exception because many mistakenly believe the cloud is less secure than traditional

Continuous monitoring is enough for compliance, but ISN’T enough for securing data

Every 4,000 miles or so I bring my car into have the oil changed, the brakes checked and tires rotated. Why? Because I know if I leave it to chance, at some point down the road something much more devastating will affect the car. Many of us follow this simple preventive best practice. Then why is it major corporations and modest enterprises alike wait until their security is breached to address growing concerns of data theft, private information leakage or worse? Many of these companies