Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

04:00 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Edge Articles

5 Soothing Security Products We Wish Existed

Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.

These are trying times. Dark Reading recently collected some of the free services being offered to help the security staff keep up with all the new and unrelenting cyber dangers. But for those who feel they need to seek inward to fight the current cyber darkness, we seek alternatives to mainstream IT security. So here we proffer five product ideas to the true mavericks of the start-up community.

There are those who will scoff at the efficacy of some of the security solutions offered here, but that's likely because they just don't understand the importance of exploring the full spectrum of defenses on offer. But as any good social engineer, honeypot administrator or threat deception vendor will tell you, smoke and mirrors have their place in security too.

If you have other product ideas, please let us know in the comments below — a crowd-sourced design here could be just the one that catches the eye of an angel investor and brings solace to weary SOCs.

(Image: Nikki Zalewski VIA Adobe Stock)

Curtis Franklin Jr. is Senior Analyst at Omdia, focusing on enterprise security management. Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications ... View Full Bio
1 of 6

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
4/23/2020 | 9:33:57 AM
Centralized brain
There was a company in the past called Enterasys, they made a product called Net-Sight Atlas. What this product did was it pulled information from switches, routers, firewalls, servers, and authentication servers (Radius/AD). It created a list of potential threats, basically derived this information by creating a baseline of information about the specifics of your network (whos logging in, from where, and remote access).

The application would look into a list of 17K-24K policies and those you wrote or identify a zero-day attack by constantly analyzing the various environments (sentinel type of capability). Once it identified the threat, it would move the threat to "sandbox" for analysis or by moving the data stream or file using the information it obtained from the network. Once isolated (it would do this for regular users if the user did not have the right patches), the solution would utilize a number of checks and balances by checking for viruses, unknown files from a baseline developed put in place by the user; the system would identify an isolate APTs, malare or unauthorized user access to create a basis of understanding that would be stored for later retrieval. This application was ahead of its time, they'r office was located in Northern VA.

Amazing technology and capability, a number of companies use SIEM to perform a number of tasks but SIEM does not act upon a threat (prescriptive analytics); this soluiton would identify, analyze, mitigate, inform and learn. This is the tool that was not utilized because the marketing of their product was not at the paramount of the IT business, but these guys were brilliant in their foresight and evolutionary thinking.

Extreme Networks NetSight | NetSolutionStore.com


User Rank: Apprentice
4/20/2020 | 12:22:02 PM
A data integrity test solution
I enjoyed reading this article to put a bit of humor into the day.  You overlooked the scratch and sniff data integrity test for data poisoning in AI applications.  Clean data has a fresh laundry smell while poisoned data has a rotten egg smell.
Flash Poll