Page 7 - CDM-Global-Threat-Intelligence-Vendor-Landscape-2018
P. 7

On the other hand, the ability to sort            What do the leaders in this burgeoning service indus-
        out whether a pattern indicates an ac-            try have in common, and why are they featured in this
        tual attack or just happens to be ab-
        normal (“false positive”)  can also mean          CyberDefense Magazine publication?  Here are some of
        the difference between shutting down              the most important considerations:
        operating systems and continuing nor-
        mal operations without interruption.

        Just as other professional services are              Dedicated and
        subject  to  evaluation  regarding  the
        choice of contracting out or develo-                   experienced
        ping a capability in house, such as at-           leaders and staff
        torneys, accountants, and other similar
        services, these considerations must
        be taken into account in making the
        decision about  Threat Intelligence.


        It has been observed with good rea-                                            Corporate philosophy
        son that Threat Intelligence is a neces-                                       of excellence and
        sary, but not sufficient, component of
        effective defense against cyber crimi-                                         competence
        nals.  This perspective is in the context
        of cyber exploits as a manifestation of
        Asymmetrical warfare, in which the
        good guys have to be right 100% of the
        time; bad guys only have to score once.
                                                            State of the Art
        Threat Intelligence by its very nature is      systems at all levels
        Actionable Intelligence.  Threat Intelli-
        gence provides an early warning system
        and lays the foundation for appropriate
        defensive  measures  to  be  implemen-
        ted in order to avoid both the cyber
        exploit itself as well as the costly reme-                                     Human and technological
        diation effort that results in a breach.                                       resources to stay on the
                                                                                       cutting edge of Threat
        Specialized threat intelligence systems
        and professionals are the key to a success-                                    Intelligence
        ful program to manage this growing risk.

        Specialized threat intelligence systems
        and professionals are the key to a success-
        ful program to manage this growing risk.     A Proven Track Record,
                                                           including a loyal

        AND: here they are!                            following of clients.






       7    2018 - GLOBAL THREAT INTELLIGENCE
   2   3   4   5   6   7   8   9   10   11   12