Gartner Identifies Machine-Readable Threat Intelligence as One of the Top 10 Technologies for Information Security in 2014

Last week Gartner, a leading information technology research and advisory company, highlighted the top ten technologies for information security and their implications for security organizations in 2014. Analysts presented their findings during the Gartner Security & Risk Management Summit, held here through June 26.

http://www.gartner.com/newsroom/id/2778417

The top ten technologies for information security are:

  1. Cloud Access Security Brokers
  2. Adaptive Access Control
  3. Pervasive Sandboxing (Content Detonation) and IOC Confirmation
  4. Endpoint Detection and Response Solutions
  5. Big Data Security Analytics at the Heart of Next-generation Security Platforms
  6. Machine-readable Threat Intelligence, Including Reputation Services
  7. Containment and Isolation as a Foundational Security Strategy
  8. Software-defined Security
  9. Interactive Application Security Testing
  10. Security Gateways, Brokers and Firewalls to Deal with the Internet of Things

We at SenseCy are great believers in article 6.

We have been providing contextual intelligence for the past several years (and will continue to do so), but felt that it was time to take this to the next level by providing structured feeds that can link directly into SIEM and other security infrastructure and automate to a greater degree the threat intelligence implementation process. Although we believe that M2M will take a greater role in cyber security, the role of the analyst will not be diminished, as there will be a greater need to analyze and filter the results prior to us releasing the feed to our clients (to maintain a very low false-positive alert rate). We also aim to engage the malware supply chain at an earlier phase than most, effectively obtaining and analyzing malware before widespread distribution, thus allowing our clients to prepare their security infrastructure by adding concrete identification parameters prior to infection.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s