AccessData to present first CAIR Platform at GISEC
Firm will introduce 'world's first' CAIR platform, The ResolutionOne
Cyber security firm AccessData, has today announced its participation at Gulf Information Security Expo and Conference (GISEC) 2014, where it will showcase its ResolutionOne Platform.
The ResolutionOne Platform, which integrates network, endpoint and malware analysis, end-to-end e-discovery and remediation technologies into a single, scalable solution is described by Accessdata as “the world’s first Continuous Automated Incident Resolution (CAIR) platform, delivering comprehensive, real-time insight, analysis, response and resolution of data incidents.”
It is designed to enable all security, legal and compliance teams to do their jobs using one platform, automating tasks and collaborating in real time to address virtually any security incident or legal matter.
Paul Wright, manager of professional services and investigation team, Middle East, India and Africa at AccessData said, “Organisations in the Middle East should be prepared to combat cyberattacks. It is no longer, 'if', but rather 'when' the enterprise will be attacked. According to HP’s Cyber Risk Report 2013, in today's world of rising e-crimes and growing demands for secure software, it is imperative to eliminate opportunities for stealing important information that is valuable for attackers. This applies to the Middle East as it is no different to any other region when it comes to the acceptance of emerging technologies and the vulnerabilities that they bring.”
Continues on next page >>>
The company will be using the event, which takes place at Dubai World Trade Centre from 9-11 June, to increase its regional awareness as Lucas Zaichkowsky, enterprise defense architect at AccessData, will be speaking on ‘incident response tools and strategies to get companies responding faster and minimising risks following a cyberattack or breach’.
“Every organisation needs advanced and integrated security and forensic solutions to successfully investigate cybercrimes, internal policy violations and security incidents. Each case presents unique challenges as the data can often be hidden in plain sight. It is important for organisations to understand how to sift through the digital incident trail, reconstruct a timeline of events and identify the ‘who, what, when and how’ of a breach,” says Zaichkowsky.
His presentation will cover topics such as preserving digital evidence to recognised international standards, reviewing the latest forensic capture and analysis tools, critical features for network forensics investigation perspectives, integrating forensic techniques into incident response and creating and maintaining procedures and guidelines for performing incident response tasks.