GOD isn’t watching you; it’s “Big Brother.”
That is if the company bought a network-security appliance from Cyberoam Technologies Pvt. Ltd. (CTPL) that contains the Sophos’s subsidiary’s tool called User Threat Quotient (UTQ).
CTPL Head for Asia Pacific Amar Mehta Sr. warned companies that don’t have tools like their UTQ would “suffer from the expensive impact of losing controls over their network security.”
“With the evolution of information technology and network security, organizations must be able to adapt and keep pace with cyber-defense strategies. [Our] UTQ technology eliminates the need for enterprises, particularly in the small and medium business sector, to invest in separate security tools just to address this concern,” Mehta said in a recent news briefing.
He supported this warning by citing studies that “have proved that network users are the weakest link in the security chain.” Mehta, however, didn’t cite sources of this claim.
Available on CTPL’s firewall and unified threat-management appliances, Mehta said the UTQ uses the information based on the user’s Web patterns to determine high-risk users that pose security and legal risks.
Patterns of human behavior can be used to predict and prevent attacks, he explained.
Mehta said a security manager can now adopt a proactive stance to prevent forthcoming security threats.
“With the lack of actionable security data, enterprise security teams find it hard to detect risk-prone user behavior on time. Our new UTQ feature will help security officers to profile the suspicious Web behavior of network users,” Mehta added.
He explained the UTQ analyzes the Web-surfing behavior of users by analyzing massive data of allowed and denied Web traffic for Web categories like Internet protocol address, peer-to-peer, phishing and fraud, pornography, spam uniform resource locator (URL), spyware, URL translation sites and others that pose security and legal risks.
Mehta said with the UTQ, chief security officers and IT security managers can automatically spot risky users based on their Web behavior at a glance.
It removes the complexity in analyzing terabytes of logs to identify suspicious or risk-prone user behavior.
The tool, he added, enables investigation into the spread of risk within the network and applies corrective actions.
Mehta said the paradigm shift in IT and network security indicates a growing need to focus on internal threats or risks from users.
“Many chief executive officers recognize analytics and actionable security as a key investment area besides cloud, virtualization and mobility, to leverage security analysis that enables faster decision-making.”
Security solutions would drive information-communications technology (ICT) spending in the Philippines, the International Data Corp. said last month.
“IDC believes enterprises and small and medium-sized enterprises in the country will be driven to prioritize business continuity and disaster recovery and security solutions more than ever,” the research firm said in a statement.
There is a need to fortify the ICT infrastructure of companies in the Philippines, the IDC statement said quoting IDC Philippines analyst Cecilia Santos.
Rizal Raoul Reyes