Guidance Software to stress forensic security at (ISC)2 SecureDubai

EnForce Risk Manager is designed to identify, classify, and remediate private or sensitive data across the enterprise

Tags: Cyber crimeGuidance Software (www.guidancesoftware.com/)
  • E-Mail
Guidance Software to stress forensic security at (ISC)2 SecureDubai Fortunato Guarino: "It is no longer a case of if a data breach will occur but rather a question of when."
By  Aasha Bodhani Published  November 20, 2016

Guidance Software has announced its participation at (ISC)2 SecureDubai 2016, where it will discuss how organisations can manage the surface area of digital risk in a virtual world with forensic security.

At (ISC)2 SecureDubai 2016, Guidance Software will highlight how their EnForce Risk Manager can help organisations proactively identify, categorise, and remediate private or sensitive data across the enterprise. The solution offers the deepest level of insight and control of electronic data across all endpoints, file shares, servers, and cloud repositories. This enables organisations to improve business intelligence, ensure compliance, and mitigate many types of risks.

Fortunato Guarino, solution consultant EMEA and Cybercrime & Data Protection Advisor at Guidance Software, said: "Using aviation as an analogy, if airlines promised a 99% safety rate, we are looking at approximately 300,000 crashes a year! You wouldn't tolerate the 1% failure rate with airlines, so why should you when it comes to the security of your organisations' most critical assets?

"Building on the aviation analogy, Network Protection tools are like airport security, they are getting more advanced, but they aren't perfect and threats still get through. And when they do, they aren't easy to uncover. In fact, according to a Verizon Data Breach Investigation Report, 66% of breaches take months or even years to discover, highlighting acute visibility gaps in security defences."

"It is no longer a case of if a data breach will occur but rather a question of when. As such, it is imperative for organisations to go beyond just perimeter security solutions and deploy endpoint detection and response tools that identify forensic residue across every stage of the attack cycle and then triage and remediate the threats that will penetrate the network," concluded Guarino.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code