21CT Unveils Hands-on Security Analytics Methodology for Detecting Directed DNS Attack
AUSTIN, TX, Aug 27, 2013 (Marketwired via COMTEX) --
21CT today announced a new series of analysis methodologies designed
to arm network security professionals with practical guides to follow
as they extend their perimeter defense skills, proactively defend
their networks and reduce time to detection. These technical how-to
guides offer step-by-step instructions for solving real-life security
analytics problems and answering critical investigative questions.
Published today, the first installment in the series is a guide for
quickly detecting and mitigating directed DNS vulnerabilities that
pose a risk to all businesses. Additional analysis methodologies on
network security, fraud detection and more will be announced
regularly on the 21CT blog.
Detecting directed DNS attack with 21CT security analytics
Because of its sheer volume, DNS traffic is one of the largest
analytic challenges and is often ignored when it comes to security
analytics, yet the potential damage that DNS vulnerabilities pose to
a business are enormous. The first security analytics methodology,
"Detecting Directed DNS," provides immediate actionable intelligence
for any organization, something not possible using current manual
methods such as sifting through rows and rows of logs. Using this
security analytics methodology, investigators will interact with and
visualize DNS data, fuse it with other network data to find
relational connections, and quickly see DNS vulnerabilities.
"We understand the challenges facing security analysts each day --
defending their networks, fighting fraud and investigating criminal
activity," said Logan Gilbert, vice president of analysis services at
21CT. "We designed our series of analysis methodologies to address
the most common and challenging obstacles facing analysts today with
practical, real-world advice on proven strategies for success."
The "Detecting Directed DNS" security analytics methodology provides
security professionals with step-by-step instructions to immediately
enhance the security of their business assets through:
-- Dramatic reduction in time to detection of crippling vulnerabilities -
Despite managing large volumes of DNS traffic data, network security
professionals can quickly distinguish between compromised systems and
those with misconfigurations or non-malicious policy violations.
-- Immediate acceleration of time to mitigation of policy violators and
malicious attackers - By allowing analysts to prioritize remediation
time on infected systems and secure the network faster, they can avoid
wasting critical hours on system problems that turn out simply to be
Network security professionals can download the methodology and get
started today. To provide feedback on the analytic and investigative
challenges facing today's security professionals and to shape future
methodologies, please contact us at email@example.com.
21CT data analytics and visualization solutions
illuminate the intelligence in your data. Using LYNXeon from 21CT,
organizations gain the operational and actionable insight needed to
harden network security, detect health care fraud, document criminal
behavior and more. For more information and to find out how to
illuminate the intelligence from your data, visit www.21CT.com.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2389212
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2389215
+1 (781) 378-2674
[ InfoTech Spotlight's Homepage ]