by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 30, 2013
endpoint visibility, you don t know where your data is going," he said. That s where endpoint analytics come in. To use the technique properly, IT managers must first understand that they can t protect all data, only the information most important at the enterprise level. Next, they need to implement endpoint visibility to get a bird s-eye view into security risks and threats and gain the ability to quickly derive insights from visual representa- tions of data. For example, a manager can spot a blinking red light that cor- responds to a computer that is dissemi- nating information at 3 a.m. and imme- diately know that s an anomaly. "The visualization really allows you to take vast sums of data [and] drill down into it quickly and effectively," McCormack said, especially when it s combined with geographical tech- nology such as Google Earth, which can help managers pinpoint not only problem machines but where they are located without having to stop and check assignment logs. Forensics collection is also impor- tant to security but difficult to conduct without endpoint information. "You have to have, No. 1, people who know how to do the analysis and No. 2 the right endpoint software controls or the right forensic software and you have to have standardization," McCormack said. Looking at someone s computer, disk images, phones, live and physical memory, thumb drives, registry and snapshots can shed light on what was happening when suspicious activity showed up, whether the machine was sending or receiving abnormal data. "If you have the capabilities at the endpoints on the servers, on these different things, you re able to do an analysis across your network that s able to give you such a beautiful pic- ture of what is going on," McCormack said, adding that monitoring only parts of the network isn t enough because a virus acts one way on an endpoint but differently on a server. "The difference between a good incident response and a bad incident response typically comes down to what kind of endpoint controls you have." he said. "What kind of forensic capa- bilities did you have? Are you able to recreate the overall picture?" Endpoint analysis helps but, like the other security tools, it s not a silver bullet either, said Anthony Di Bello, security practice lead and strategic partnerships manager at Guidance Software. "The reason that we re in a defense- in-depth-type situation is no tech- nology is a panacea or 100 percent effective given the rate of change of hardware, software and usage of com- puting devices," Di Bello said. "We ve spent 15, 20 years on perimeter-based security and there is still an element of attackers that are being very, very suc- cessful. Where don t we have visibil- ity? Where haven t we invested in vis- ibility? On the endpoint. ... Over time, that s what we re looking to achieve: closing this final gap in visibility." SPONSORED CONTENT SPONSORED BY: For more from Guidance Software, Inc. go to: EnCase.com/products/ Pages/encase-analytics/ overview.aspx "The difference between a good incident response and a bad incident response typically comes down to what kind of endpoint controls you have." --- Matthew McCormack, partner at Aerstone DATA GROWTH BY THE NUMBERS As data grows at exponential rates, methods to protect it must try to keep up. Here's how information is proliferating, said Matthew McCormack, partner at Aerstone. E-mail - sages sent per day worldwide second spam/virus are projected to increase from Social Media
September 15, 2013
October 30, 2013