CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

IDC Intelligence-Led Security

White Paper Published By: IBM
IBM
Published:  Jul 26, 2017
Type:  White Paper
Length:  9 pages

While there has been improvement in the amount of time an attacker spends in a network before detection decreasing from years to days in many cases the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.



Tags : 
data security, threat intelligence, security operations, advanced security analysts

Search