Remove Big data Remove Digital transformation Remove Firewall Remove Marketing
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. The path this San Mateo, CA-based vendor is trodding tells us a lot about the unfolding renaissance of SIEMs – and where it could take digital commerce.

Big data 157
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Here are my takeaways: Skills deficit Over the past 20 years, enterprises have shelled out small fortunes in order to stock their SOCs with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. Digital transformation has only exacerbated this security skills gap.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

I had an evocative discussion about this with Sam Humphries, senior product marketing manager for Exabeam. IBM’s recent data breach study shows how the cost of a data breach has risen 12% over the past five years and now costs $3.92 We spoke at Black Hat USA 2019. based supplier of advanced security management systems.

Big data 153
article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

IIoT applications offer a great return on investment while enabling manufacturers to improve automation, visibility, customer-centricity, and time to market. In a typical quality control process, after manufacturers produce an item, it’s tested by quality control with the aim of rectifying flaws before the product reaches the market.

article thumbnail

MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall

The Last Watchdog

All these cloud-centric security advancements boil down to keeping closer track of Identity and Data connections. Human-to-machine connections comprise one level of the digital hook-ups fueling digital transformation. And the solution seems obvious: Big Data. This is not anything new.

Software 200
article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. These databases house the crown jewels of many organizations, critical applications and customer data, and thus are a primary target of hackers.

Firewall 120
article thumbnail

Top 6 API Security Questions Answered

Security Boulevard

They enable organizations to supply the digital services that support everyday activities like shopping online, booking a holiday or using a banking app. The unprecedented growth of API usage across all industries in recent years has accelerated digital transformation and brought new API security challenges to light.