September 1, 2015 — A question of balance
NuData Security’s comments are included in a SC Magazine article focused on closing the gap between breach and detection. Most network security professionals agree that there’s no such thing as a perfect system. But that’s not what keeps them up at night. The biggest source of frustration is the ongoing quest for a balanced approach that will enable them to detect breaches early and keep data safe.
Defining that new blueprint is a challenge because the business and end-user environment in which data is accessed and shared has changed dramatically. The proliferation of mobile devices, user demand for instant anytime-anywhere access, and the growth of the bring-your-own-device (BYOD) trends, coupled with the dramatic increase in the communications power of all user devices, has extended the network that must be protected. In this new environment, an effective security strategy requires new tools that go beyond the capabilities of traditional protection systems.
“An additional level of protection is needed that looks at not just what’s connecting, but also who’s connecting,” says Ryan Wilk (left), director of customer success at NuData Security, a Vancouver, B.C., Canada-based software development company. “That’s really where the big gap is. We’ve done a good job identifying machines and connections and how ports are being used, but we’re not as advanced as we should be at understanding what the human who is using the machine is doing – the behavior that allows us to understand that there may be a level of risk with a specific access event.”
To see the full article at SC Magazine, click here.