Last week Gartner, a leading information technology research and advisory company, highlighted the top ten technologies for information security and their implications for security organizations in 2014. Analysts presented their findings during the Gartner Security & Risk Management Summit, held here through June 26.
The top ten technologies for information security are:
- Cloud Access Security Brokers
- Adaptive Access Control
- Pervasive Sandboxing (Content Detonation) and IOC Confirmation
- Endpoint Detection and Response Solutions
- Big Data Security Analytics at the Heart of Next-generation Security Platforms
- Machine-readable Threat Intelligence, Including Reputation Services
- Containment and Isolation as a Foundational Security Strategy
- Software-defined Security
- Interactive Application Security Testing
- Security Gateways, Brokers and Firewalls to Deal with the Internet of Things
We at SenseCy are great believers in article 6.
We have been providing contextual intelligence for the past several years (and will continue to do so), but felt that it was time to take this to the next level by providing structured feeds that can link directly into SIEM and other security infrastructure and automate to a greater degree the threat intelligence implementation process. Although we believe that M2M will take a greater role in cyber security, the role of the analyst will not be diminished, as there will be a greater need to analyze and filter the results prior to us releasing the feed to our clients (to maintain a very low false-positive alert rate). We also aim to engage the malware supply chain at an earlier phase than most, effectively obtaining and analyzing malware before widespread distribution, thus allowing our clients to prepare their security infrastructure by adding concrete identification parameters prior to infection.