article thumbnail

How to Measure Threat Detection Quality for an Organization?

Anton on Security

but also don’t expect questions… So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection. Here I’m talking about the quality of the entire detection capability of an organization. A macro-level detection quality, if you would. Have fun with it anyhow!

article thumbnail

How to Measure Threat Detection Quality for an Organization?

Security Boulevard

So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection. Here I’m talking about the quality of the entire detection capability of an organization. A macro-level detection quality, if you would. You may have got good coverage and bad detection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

Cisco Security

User endpoints generate NVM data with rich and granular device context – such as IP addresses, host and user names, machine types and models, which operating systems and versions are running, the processes that launched network connectivity, MAC addresses, hash information, and more – that is all collected and stored in the Data Store.

article thumbnail

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

Cisco Security

User endpoints generate NVM data with rich and granular device context – such as IP addresses, host and user names, machine types and models, which operating systems and versions are running, the processes that launched network connectivity, MAC addresses, hash information, and more – that is all collected and stored in the Data Store.

article thumbnail

Report Finds Over 50% of Security Practitioners Are Unhappy With Current SIEM Vendor

CyberSecurity Insiders

Analysts find dealing with data collected from numerous hosts within an enterprise to be a daunting task. The time necessary to acquire security data, the rigidity around how the data can be analyzed, and the speed at which data can be processed make these tools less useful than they should be.

article thumbnail

MSSP Focus: Three ways your SIEM (even NG-SIEM) is hurting your ability to grow

CyberSecurity Insiders

Instead, many are looking to do a better job of identifying and mitigating threats before they can harm their business. SIEMs , in their inherent, built-in bias to complete data collection, means that a security team looking to identify threats will wade through oceans of irrelevant log data in the hopes of uncovering a danger.

article thumbnail

Challenge Accepted: Detecting Threats in the Cloud

SecureWorld News

Augusto Barros, Vice President of Solutions at Securonix , presented at SecureWorld on the challenge of detecting threats in the cloud. The challenge of detecting threats in the cloud. Threat detection tools before the cloud focused primarily on networks, endpoints, and logs.