HOME     MENU     SEARCH     NEWSLETTER    
CUSTOMER RELATIONSHIP MANAGEMENT NEWS. UPDATED 7 MINUTES AGO.
You are here: Home / Computing / Expert: Data Defense Should Be United
Neustar, Inc.
Protect your website & network using real-time information & analysis
www.neustar.biz
Data Defenders Should Share Resources, Says Symantec Expert
Data Defenders Should Share Resources, Says Symantec Expert
By Adam Dickter / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
05
2014
(Page 2 of 2)

To protect proprietary information, he added, the system must be designed to meet global policy regulations with regard to privacy and data protection.

In one scenario, Trilling said, a computer from Company 1 connects to a particular FTP server. Later, after a targeted attack, a team discovers that same server was used in the attack. "The team can now go and mine Company 1's data to figure out what file was used in the attack, and to further figure out how did that file get in and, if it came from an e-mail domain that is suspicious, who else inside Company 1 also received e-mail from that domain?" Trilling explained. "We'll be able to connect the dots spanning industries or economic sectors."

No Silver Bullets

In an earlier address at the RSA Conference, Art Gilliland, senior vice president and general manager of Enterprise at Hewlett Packard, said his company's research of its clients showed that too many relied excessively on software and hardware to protect their systems, while skimping on safe practices by smart managers.

Rather than chase "silver bullets," he said companies must invest in a trifecta of "people, process and technology." Companies that did so saw 21 percent better returns on their investment and saved on average $4 million more than other companies.

Based on assessments of 96 companies globally, HP found that most spent 86 percent of their security budget trying to block threats at the infiltration stage. Meanwhile, personnel had a minimalistic "check box" approach toward security practices and policies.

"Almost a quarter of the people implementing this strategy failed to meet the minimum security standards they set for themselves," he said. "They are aspiring toward the low bar of compliance. And 30 percent failed to even meet compliance."

< Previous Page  1  2

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Enterprise Endpoint Backup - What You Need to Know and Why: Access this must-read report that IT leaders and their peers are referencing to narrow down their backup shortlist. Gartner rates the key capabilities for endpoint backup for both mobile and office-centric workforces, from data protection to security risk reduction, and increased user productivity. Access the Report Now.
MORE IN COMPUTING
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.