AUSTIN, TX--(Marketwired - Aug 27, 2013) - 21CT today announced a new series of analysis methodologies designed to arm network security professionals with practical guides to follow as they extend their perimeter defense skills, proactively defend their networks and reduce time to detection. These technical how-to guides offer step-by-step instructions for solving real-life security analytics problems and answering critical investigative questions. Published today, the first installment in the series is a guide for quickly detecting and mitigating directed DNS vulnerabilities that pose a risk to all businesses. Additional analysis methodologies on network security, fraud detection and more will be announced regularly on the 21CT blog.
Detecting directed DNS attack with 21CT security analytics methodology
Because of its sheer volume, DNS traffic is one of the largest analytic challenges and is often ignored when it comes to security analytics, yet the potential damage that DNS vulnerabilities pose to a business are enormous. The first security analytics methodology, "Detecting Directed DNS," provides immediate actionable intelligence for any organization, something not possible using current manual methods such as sifting through rows and rows of logs. Using this security analytics methodology, investigators will interact with and visualize DNS data, fuse it with other network data to find relational connections, and quickly see DNS vulnerabilities.
"We understand the challenges facing security analysts each day -- defending their networks, fighting fraud and investigating criminal activity," said Logan Gilbert, vice president of analysis services at 21CT. "We designed our series of analysis methodologies to address the most common and challenging obstacles facing analysts today with practical, real-world advice on proven strategies for success."
The "Detecting Directed DNS" security analytics methodology provides security professionals with step-by-step instructions to immediately enhance the security of their business assets through:
- Dramatic reduction in time to detection of crippling vulnerabilities - Despite managing large volumes of DNS traffic data, network security professionals can quickly distinguish between compromised systems and those with misconfigurations or non-malicious policy violations.
- Immediate acceleration of time to mitigation of policy violators and malicious attackers - By allowing analysts to prioritize remediation time on infected systems and secure the network faster, they can avoid wasting critical hours on system problems that turn out simply to be misconfigured.
Network security professionals can download the methodology and get started today. To provide feedback on the analytic and investigative challenges facing today's security professionals and to shape future methodologies, please contact us at email@example.com.
21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect health care fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit www.21CT.com.
- Technology & Electronics
+1 (781) 378-2674