Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Automating incident response lets IDT take battle to the enemy

Maria Korolov | May 6, 2015
Two years ago, attackers had Newark-based telecom and payments provider IDT Corp. pinned down.

That's where Hexadite comes in, said CEO Eran Barak, whose company has been training security analysts for many years.

That deep knowledge of the security analysis process allows the company to go beyond simple rules and indicators to a complex decision tree based on an extensive library of actions.

"What you do as a cyberanalyst, we do it automatically and faster," he said. "We close the loop in seconds instead of hours or days or months."

Barak said that his company has customers for whom it processes hundreds of alerts daily, and others with thousands of alerts. In addition, Hexadite also offers a semi-automated system, where the user has the ability to control the remediation process instead of the appliance triggering it automatically.

Automation has another benefit as well, said Paul Nguyen, CEO at CSG Invotas, another security automation vendor.

"Automation significantly reduces human error which is responsible for 52 percent of data breaches," he said.

Engage the enemy

Meanwhile, at IDT, Ben-Oni said that his security organization is now able to do more than simply react to incoming attacks — and hope that nothing gets missed.

There is now time to do more, he said. "Maybe on the other side of this, the action side, or the attribution side, learning more about our adversary to better iterate or protect the organization going forward."

And that's just the start, he said.

"We can then enable our security operations center to take the next step, work on attribution and eliminating the source of the threat by working with law enforcement," he said. "And that's where we're going to go into the future."


Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.