Intelligence-Driven Security Strategy

456 views
370 views

Published on


This infographic details the three essential capabilities of an Intelligence-Driven Security strategy: visibility, analysis, and action.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
456
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Intelligence-Driven Security Strategy

  1. 1. Intelligence Driven Security Strategy Adopt Intelligence Driven Security to build trust in a digital world What is Intelligence Driven Security? Intelligence Driven Security in Action 1. Gain Visibility 2. Perform Analysis A strategy to deliver the visibility, analysis, and action needed to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. Collect data that matters 1. Evaluate risk to the organization 2. Understand what is happening on the network 3. Manage digital identities Extrapolate insight from the data • Understand normal state behavior • Spot, investigate, and root out anomalies • Provide contextual analysis to determine response 3. Take Action Respond to malicious anomalies • Mitigate threats and enforce controls • Initiate remediation process • Operationalize response A strategy that delivers 3 essential capabilities Visibility, Analysis, and Action “Intelligence Driven Security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. The proliferation of access requirements by people and devices has dramatically increased security risk.” Chris Christiansen, IDC “Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization's most important digital assets.”William Boni, Corporate Information Security Officer (CISO) and Vice President, Enterprise Information Security Benefits • Balanced modern approach that mitigates risk • Insight into IT environment • Consolidate disparate data, apps, and solutions • Cost savings • Increase employee productivity • Improve competitiveness Monitoring 15% Response 5% Prevention 80% Monitoring 33% Response 33% Prevention 33% Intelligence Driven SecurityOutdated Approach EMC2 , EMC, and the EMC logo, are registered trademarks or trademarks of EMC Corporation in the United States and other countries. © Copyright 2012 EMC Corporation. All rights reserved.

×