Today, massive numbers of uncorrelated and unprioritized alerts overwhelm network security operations. Staff are unable to respond to breaches anywhere near real-time. Legacy architectures layer “best of breed” components for firewall, intrusion protection, web content filtering and antivirus protection, each of which generates a unique set of alerts. Additional devices only contribute to an ever increasing total. Often, these alerts are duplicative, reporting on the same event, exacerbating the problem. A different approach, one that can operate effectively at network scale and attack tempo, is needed. This approach requires a new architecture that fuses endpoint solutions with network- and . . .
From the Winter 2018 Issue
Industry & Business Best Practices
Implementing Automated Cyber Defense
Dr. Scott Jasper
Senior Lecturer, Captain, U.S. Navy, Retired | Naval Postgraduate School

Leave a Comment