News

Guidance Software to put spotlight on forensic security at ‘(ISC)2 SecureDubai’

fortunato_guidance-software
Fortunato Guarino, Guidance Software

Guidance Software, makers of EnCase, and EnForce, an automated risk management platform, have announced their participation at (ISC)2 SecureDubai 2016 to be held on 22nd  November at the Burjuman Arjaan by Rotana, Dubai.

Under the event theme of ‘Securing the Virtual Organisation’, Guidance will lead a discussion on how organisations can manage the surface area of digital risk in a virtual world with forensic security.

“Using aviation as an analogy, if airlines promised a 99 percent safety rate, we are looking at approximately 300,000 crashes a year! You wouldn’t tolerate the one percent failure rate with airlines, so why should you when it comes to the security of your organisations’ most critical assets?” said Fortunato Guarino, Solution Consultant EMEA and Cybercrime and Data Protection Advisor at Guidance Software, who will be leading Guidance’s presentation at the event. “Building on the aviation analogy, Network Protection tools are like airport security, they are getting more advanced, but they aren’t perfect and threats still get through. And when they do, they aren’t easy to uncover. In fact, according to a Verizon Data Breach Investigation Report, 66 percent of breaches take months or even years to discover, highlighting acute visibility gaps in security defenses.”

Given the multi-dimensional world most organisations operate in, where data is stored in multiple geographic locations, and increasingly spread across varied cloud-based data stores and file-sharing systems, deploying forensic security solutions that give IT teams 360-degree visibility of all critical assets is paramount. Using three use cases, Guidance will highlight how their EnForce Risk Manager can help organisations proactively identify, categorise, and remediate private or sensitive data across the enterprise. The solution offers the deepest level of insight and control of electronic data across all endpoints, file shares, servers, and cloud repositories. This enables organizations to improve business intelligence, ensure compliance, and mitigate many types of risks.

“It is no longer a case of if a data breach will occur but rather a question of when. As such, it is imperative for organizations to go beyond just perimeter security solutions and deploy endpoint detection and response tools that identify forensic residue across every stage of the attack cycle and then triage and remediate the threats that will penetrate the network,” said Fortunato.

Previous ArticleNext Article

Leave a Reply

GET TAHAWUL TECH IN YOUR INBOX

The free newsletter covering the top industry headlines

Send this to a friend