Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

4/3/2020
04:00 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Edge Articles
50%
50%

5 Soothing Security Products We Wish Existed

Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.

These are trying times. Dark Reading recently collected some of the free services being offered to help the security staff keep up with all the new and unrelenting cyber dangers. But for those who feel they need to seek inward to fight the current cyber darkness, we seek alternatives to mainstream IT security. So here we proffer five product ideas to the true mavericks of the start-up community.

There are those who will scoff at the efficacy of some of the security solutions offered here, but that's likely because they just don't understand the importance of exploring the full spectrum of defenses on offer. But as any good social engineer, honeypot administrator or threat deception vendor will tell you, smoke and mirrors have their place in security too.

If you have other product ideas, please let us know in the comments below — a crowd-sourced design here could be just the one that catches the eye of an angel investor and brings solace to weary SOCs.

(Image: Nikki Zalewski VIA Adobe Stock)

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Previous
1 of 6
Next
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
4/23/2020 | 9:33:57 AM
Centralized brain
There was a company in the past called Enterasys, they made a product called Net-Sight Atlas. What this product did was it pulled information from switches, routers, firewalls, servers, and authentication servers (Radius/AD). It created a list of potential threats, basically derived this information by creating a baseline of information about the specifics of your network (whos logging in, from where, and remote access).

The application would look into a list of 17K-24K policies and those you wrote or identify a zero-day attack by constantly analyzing the various environments (sentinel type of capability). Once it identified the threat, it would move the threat to "sandbox" for analysis or by moving the data stream or file using the information it obtained from the network. Once isolated (it would do this for regular users if the user did not have the right patches), the solution would utilize a number of checks and balances by checking for viruses, unknown files from a baseline developed put in place by the user; the system would identify an isolate APTs, malare or unauthorized user access to create a basis of understanding that would be stored for later retrieval. This application was ahead of its time, they'r office was located in Northern VA.

Amazing technology and capability, a number of companies use SIEM to perform a number of tasks but SIEM does not act upon a threat (prescriptive analytics); this soluiton would identify, analyze, mitigate, inform and learn. This is the tool that was not utilized because the marketing of their product was not at the paramount of the IT business, but these guys were brilliant in their foresight and evolutionary thinking.

Extreme Networks NetSight | NetSolutionStore.com

Todd

 
Gridgal
50%
50%
Gridgal,
User Rank: Apprentice
4/20/2020 | 12:22:02 PM
A data integrity test solution
I enjoyed reading this article to put a bit of humor into the day.  You overlooked the scratch and sniff data integrity test for data poisoning in AI applications.  Clean data has a fresh laundry smell while poisoned data has a rotten egg smell.
   OVER THE EDGE
All Links Are Safe ... Right?

Source: Mimecast

What security-related videos have made you laugh? Let us know! Add them to the Comments section or email us at [email protected].

Name That Toon: Tough Times, Tough Measures
Latest Comment: Wear a mask, please!
Flash Poll