1
Intelligence Driven Security Strategy Adopt Intelligence Driven Security to build trust in a digital world What is Intelligence Driven Security? Intelligence Driven Security in Action 1. Gain Visibility 2. Perform Analysis A strategy to deliver the visibility, analysis, and action needed to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. Collect data that matters 1. Evaluate risk to the organization 2. Understand what is happening on the network 3. Manage digital identities Extrapolate insight from the data • Understand normal state behavior • Spot, investigate, and root out anomalies • Provide contextual analysis to determine response 3. Take Action Respond to malicious anomalies • Mitigate threats and enforce controls • Initiate remediation process • Operationalize response A strategy that delivers 3 essential capabilities Visibility, Analysis, and Action “Intelligence Driven Security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. The proliferation of access requirements by people and devices has dramatically increased security risk.” Chris Christiansen, IDC “Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization's most important digital assets.” William Boni, Corporate Information Security Officer (CISO) and Vice President, Enterprise Information Security Benefits • Balanced modern approach that mitigates risk • Insight into IT environment • Consolidate disparate data, apps, and solutions • Cost savings • Increase employee productivity • Improve competitiveness Monitoring 15% Response 5% Prevention 80% Monitoring 33% Response 33% Prevention 33% Intelligence Driven Security Outdated Approach EMC 2 , EMC, and the EMC logo, are registered trademarks or trademarks of EMC Corporation in the United States and other countries. © Copyright 2012 EMC Corporation. All rights reserved.

Intelligence-Driven Security Strategy

Embed Size (px)

DESCRIPTION

This infographic details the three essential capabilities of an Intelligence-Driven Security strategy: visibility, analysis, and action.

Citation preview

Page 1: Intelligence-Driven Security Strategy

Intelligence Driven Security StrategyAdopt Intelligence Driven Security to build trust in a digital world

What is Intelligence Driven Security?

Intelligence Driven Security in Action

1. Gain Visibility

2. Perform Analysis

A strategy to deliver the visibility, analysis, and action needed to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime.

Collect data that matters1. Evaluate risk to the organization2. Understand what is happening on the network3. Manage digital identities

Extrapolate insight from the data• Understand normal state behavior• Spot, investigate, and root out anomalies• Provide contextual analysis to determine response

3. Take Action

Respond to malicious anomalies• Mitigate threats and enforce controls • Initiate remediation process• Operationalize response

A strategy that delivers 3 essential capabilitiesVisibility, Analysis, and Action

“Intelligence Driven Security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. The proliferation of access requirements by people and devices has dramatically increased security risk.”

Chris Christiansen, IDC

“Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization's most important

digital assets.”William Boni, Corporate Information Security Officer(CISO) and Vice President, Enterprise Information Security

Benefits• Balanced modern approach that mitigates risk• Insight into IT environment• Consolidate disparate data, apps, and solutions• Cost savings• Increase employee productivity• Improve competitiveness

Monitoring15%

Response5%

Prevention80%

Monitoring33%

Response33%

Prevention33%

Intelligence Driven SecurityOutdated Approach

EMC2, EMC, and the EMC logo, are registered trademarks or trademarks of EMC Corporation in the United States and other countries.© Copyright 2012 EMC Corporation. All rights reserved.