Home » Computer & Software » Hardware » 21CT Unveils Hands-on Security Analytics Methodology for Detecting Directed DNS Attack
Ihren XING-Kontakten zeigen

21CT Unveils Hands-on Security Analytics Methodology for Detecting Directed DNS Attack

AUSTIN, TX — (Marketwired) — 08/27/13 — 21CT today announced a new series of analysis methodologies designed to arm network security professionals with practical guides to follow as they extend their perimeter defense skills, proactively defend their networks and reduce time to detection. These technical how-to guides offer step-by-step instructions for solving real-life security analytics problems and answering critical investigative questions. Published today, the first installment in the series is a guide for quickly that pose a risk to all businesses. Additional analysis methodologies on network security, fraud detection and more will be announced regularly on the 21CT blog.

Because of its sheer volume, DNS traffic is one of the largest analytic challenges and is often ignored when it comes to , yet the potential damage that DNS vulnerabilities pose to a business are enormous. The first security analytics methodology, “Detecting Directed DNS,” provides immediate actionable intelligence for any organization, something not possible using current manual methods such as sifting through rows and rows of logs. Using this security analytics methodology, investigators will interact with and visualize DNS data, fuse it with other network data to find relational connections, and quickly see DNS vulnerabilities.

“We understand the challenges facing security analysts each day — defending their networks, fighting fraud and investigating criminal activity,” said Logan Gilbert, vice president of analysis services at 21CT. “We designed our series of analysis methodologies to address the most common and challenging obstacles facing analysts today with practical, real-world advice on proven strategies for success.”

The “” security analytics methodology provides security professionals with step-by-step instructions to immediately enhance the security of their business assets through:

Dramatic reduction in time to detection of crippling vulnerabilities – Despite managing large volumes of DNS traffic data, network security professionals can quickly distinguish between compromised systems and those with misconfigurations or non-malicious policy violations.

Immediate acceleration of time to mitigation of policy violators and malicious attackers – By allowing analysts to prioritize remediation time on infected systems and secure the network faster, they can avoid wasting critical hours on system problems that turn out simply to be misconfigured.

Network security professionals can the methodology and get started today. To provide feedback on the analytic and investigative challenges facing today-s security professionals and to shape future methodologies, please contact us at .

21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect health care fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit .

Image Available:
Embedded Video Available:

Contacts:
Sarah Murray
Attune Communications
+1 (781) 378-2674

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop