A Time for Change in Security:
Closing the Breach Detection Gap
The highly publicized targeted attacks carried out recently against some of the world’s largest retailers and banks represent the largest personal information leaks in the history of modern information technology.
How is this still happening despite the massive investment in new threat prevention products available from numerous vendors?
It is now clear that despite decades of development of solutions such as next-generation firewalls and endpoint protection systems, such products are incapable of stopping new advanced threats. Traditional threat prevention systems employ static, “hit-or-miss” detection techniques that have been proven incapable of accurately detecting all known malware, let alone unknown malware or attacks that don’t use malware at all.
While threat prevention systems are necessary for blocking well-known attacks, recent testing of leading next-generation firewalls and malware detection systems by a leading industry analyst demonstrates that these systems generally block only about 95% of known attack vectors and malware, and fare much worse against unknown malware, social engineering and other non-network based attack techniques. The problem is so challenging and pervasive that Gartner Research recently published a research note titled, “Malware is Already Inside Your Organization: Deal With It” (Firstbrook and MacDonald, 2014).
How can an executive team sleep at night, confident that their critical information assets are safe in the face of such an ever growing threat of advanced attack?
Introducing: Active Breach Detection (ABD)
LightCyber™ is leading the industry in developing a new category of IT security infrastructure called Active Breach Detection systems, which hunt down the attackers that circumvent your legacy threat prevention systems. Active Breach Detection (ABD) systems dramatically reduce attack dwell time, limiting or eliminating the damage caused by attacks, and increase security operations efficiency with highly accurate, true positive alerts. ABD solutions employ significantly different attack detection methods compared to legacy threat prevention architectures developed for the last 25 years.Independent Software Vendor (ISV)Network Equipment Manufacturer (NEM)
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.