18
NEWS
When threat intelligence is the answer to drowning in security solutions
new research note from McAfee and Ovum hints at why the security situation is so bad. Almost 73 percent of financial institutions report working with over 25 cyber security tools that lengthen response times and reduce effectiveness
A
The report analyses the decision-making process of financial institutions when it comes to cybersecurity and outlines the critical gaps in security infrastructure that need be closed to ensure financial institutions remain ahead of attackers. That there are any significant gaps is worrying in itself.
The one to many rule
The interconnected nature of underlying financial systems means that cyber attacks against one bank can quickly open the door to attacks on several banks. As a result, financial services are facing the same issues globally – and must work together to address these and adopt best practice.
The Ovum report finds that an overwhelming number of financial institutions, especially Tier 1 and 2, deploy between 100-200 disparate security solutions. The report also finds that three percent of global financial services institutions use over 100 security solutions, reducing effectiveness and creating additional operational cost, This increases their organisation’s cyber risk exposure.
Adding to security teams’ burdens: 37 percent of respondents deal with over 200,000 daily security alerts. Security teams are overwhelmed with sifting through and prioritising the vast amounts of alerts that each security tool is often generating with limited threat intelligence sharing between the various tools in a cohesive and adaptive manner.
Not surprisingly, over a third of respondents of thesurvey across EMEA, US and APAC listed integrating and maintaining disparate security tools as their top operational pain point.
Greater
automation, integration and orchestration are necessary first steps to provide relief to these teams,
which can only be delivered through a unified threat defence architecture. The transformation to an open source communications fabric offers a significant impact on the efficiency and effectiveness for organisations by simplifying the integration of disparate tools and enabling the sharing of threat data.
Key to a broken lock
Nigel Bolt, vice president, McAfee said: “Banks are so bogged down in legacy solutions and fragmented security point products that cyber criminals are able to take advantage of this confusion and disconnect. They’re lurking amongst the complexity of architecture systems, undetected, ready to strikeThe key to avoiding disaster scenarios is to have the capabilities in place to detect a threat in real-time and correct any damage before it has a chance to spread.”
A light at the end of the tunnel recently was what the security industry called ‘threat intelligence’. This meant that clients were encouraged if they were publishers such as the Economist to concentrate on the hackers most likely to attack publications; regional hospitals in the US were warned to concentrate on their most likely attackers and so on. What is threat intelligence? Gartner has defined threat intelligence as: “evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” The banks should realise that only threat- intelligence can narrow down the expected attack vector.
www.ibsintelligence.com © IBS Intelligence 2017
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52