Telling the truth about SME life today

Top 10 technology trends for information security

We couldn’t agree more! So here are the latest tech trends for information security.

1. Cloud access security brokers

Cloud access security brokers are on-premises or cloud-based security policy enforcement points placed between cloud services consumers and service providers to interject enterprise security policies as the cloud-based resources are accessed. 

2. Adaptive access control

The use of adaptive access management will enable an enterprise to allow access from any device, anywhere, and allows for social ID access to a range of corporate assets with mixed risk profiles.

3. Pervasive sandboxing and IOC confirmation

Many security platforms now run (“detonate”) content in virtual machines (VMs) and observe the VMs for indications of a breach. Once a potential incident has been detected, it is compared against correlating indicators across different entities. For example, what a network-based threat detection system sees in a sandboxed environment to what is being observed on actual endpoints in terms of processes, behaviors and registry entries.

4. Endpoint detection and response solutions

These tools record numerous endpoint and network events and store this information in a centralised database. Analytics tools are then used to continually search the database to identify tasks that can improve the security state to deflect common attacks.

5. Big Data security analytics

An enterprise’s continuous monitoring of all computing entities will eventually generate a greater volume and variety of data than traditional SIEM systems can analyse. Gartner predicts that by 2020, 40 per cent of enterprises will have established a “security data warehouse” for the storage of this monitoring data to support retrospective analysis.

Image source

Trending

Related Stories

Most Read

Trending

If you enjoyed this article,
why not join our newsletter?

We promise only quality content, tailored to suit what our readers like to see!