| | September 20139CIOReviewTrending Now: Highly Intelligent Security DevicesBrett Helm, CEO & Chairman, DB NetworksSan Diego based DB Networks is a provider of adaptive database firewall equipment for organizations who need to protect their data from network-based database attacks. Founded in 2009, the company has received funding of $4.5 million from Khosla Ventures.From the beginning, malware detectors, web application firewalls and intrusion detection were based on signature patterns, regular expression matching, or black lists. Configuration and support of these approaches is extremely time consuming. Worse, determined hackers are able to conceal their attacks to defeat these first generation technologies. This has created a need for advanced behavioral analysis. With behavioral analysis a model of proper behavior is automatically established through a machine learning process. Any activity that deviates from the established behavioral model is flagged as a likely security event. Because the behavioral model is learned automatically there is nothing to configure or maintain. Another benefit of behavioral analysis is that it provides immediate protection against zero-day threats. All zero-day attacks have behaviors dissimilar from the established model and thus are immediately identified.Warding off HackersPreviously, it was thought that there is a cyber threat and a separate distinct inside threat. Insiders were far more trusted and security measures inside the perimeter were few. Hackers exploited this broken strategy by simply penetrating perimeter security measures and attacking as an insider. It is no secret that searching for "WAF Bypass" returns many thousands of "how to" websites and detailed tutorials on techniques to penetrate these perimeter devices. Often the WAF is attempting to protect against known web application vulnerabilities. Once the WAF perimeter defense is breached, the attacker is operating as an insider. I see organizations becoming far less trustful of insiders in general. They are deploying security defenses around the core systems to protect the "crown jewels", the data on their databases. This establishes a second perimeter around their core assets. A core IDS, for example, is designed to identify SQL injection intrusion attempts against your database assets.getting Customer Mindshare In most organizations security is not strategic, it is simply an expense. Usually IT is understaffed and they spend a great deal of their time fighting the fire de jour. So the challenge is to offer such an extremely compelling and innovative value proposition that the customer will even give you an appointment. Brett HelmCEO SpotlightGain insight into the specic technology challengesfaced by the travel and hospitality industryResource book for technology decision makersProle of selected solution providersVendor company CEOs share how their solutions is e ective in addressing some of the pain pointsLeading CIOs share their experiences & wisdom and IT spending prioritiesSee how contemporaries are thinking and tackling the problems by leveraging technology......TRAVEL & HOSPITALITY www.cioreview.com/outlook/. To participate in this special edition call Steve Miller on 510.936.8551 or write to steve@cioreview.com
< Page 8 | Page 10 >