Page 60 - Cyber Warnings
P. 60
Take an assumed breach security posture and take measures to gain visibility to know what
threats are hiding in your network. Realize that stolen credentials provide access to central
servers that can infect and re-infect all of your POS terminals, if you don’t prevent this from
happening. Adding detection will dramatically reduce the risk of your company becoming the
next headline and experiencing the impact of angry consumers whose loyalty may never return.
It starts with real-time visibility to detect threats that are already in your network. This visibility
will provide insight into your network with software that can show and analyze the lateral
movement of any form of new or old threat that enters your network and threatens your POS
installations. The solution you choose should be able to identify these threats without the need
for signatures or the time to learn for pattern matching, and the alerts should be accurate and
not generate false positive alerts or stream endless amounts of uncorrelated information to
already overburdened security analysts.
Enterprises are now using active deception systems for visibility into in-network threats or the
phase referred to as post infection compromise. These systems or platforms offer the capability
to exercise deception at every layer of information and network stacks. Deception can efficiently
lead an attacker into revealing themselves, thereby helping an enterprise harden its
infrastructure and obtain the attack forensics to stay alert and protect their assets effectively.
Deception is rapidly growing in customer adoption and is now consistently being recognized as
the most efficient method for detecting advanced threats by analysts Gartner, 451 Research,
Frost and Sullivan and other leading analysts firms.
Deception solutions provide clear value to organizations by proactively revealing the presence
of attackers in both business and distributed POS networks. The efficiency and accuracty of this
approach to detection, should be one that every organization consider as they look at how to
combat advanced threats and protect their networks. The loss of customer data, financial
ramifications to their company, and the resulting loss of reputation in a major breach may be the
unfortunate outcome for the companies that don’t.
About the Author
Carolyn has over 25 years of experience in high tech marketing and sales
management. At Attivo Networks she is the Chief Marketing Officer
responsible for overall marketing strategy, building company awareness, and
creating customer demand through education programs and technology
partnerships. She has built leading brand strategy and awareness, high-
impact demand generation programs and strong partnerships for some of the
industry’s fasted growing high-tech companies including Cisco Systems, Juniper Networks,
Riverbed, Nimble Storage, and Maxta.
60 Cyber Warnings E-Magazine December 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide