Help AG spearheads cyber-sec one-stop with AccessData, Infoblox
GISEC 2014: Trio collaborates on bespoke security proposition for regional corporate networks
As the Gulf Information Security Exhibition and Conference (GISEC) enters day two, a trio of cyber-sec specialists are setting out their vision for a safer corporate network.
Help AG acts as systems integrator for solutions vendors Infoblox and AccessData in a one-stop-shop proposition, with Infoblox bring preventative measures and AccessData delivering network analytics and cyber forensics capabilities.
Help AG is spearheading the proposition, which delivers bespoke solutions from the vendors based on specific requirements.
"We are a complete IT security-focused system systems integrator business with all the services associated with that [including] consulting, policies and any system certification frameworks [clients] might need to follow," explained Nicolai Solling, director, Technology Services, Help AG.
"For a bank it might be PCI; for a production company it might be ISO 27000. Then we do vulnerability assessment and penetration testing and finally we do system integration of different solutions."
Dr Cherif Sleiman, general manager, Infoblox, laid out for ITP.net his view of the present-day cyber-security challenge.
"We've done a great job as an industry in the past decade in fortifying the network," he said. "We've added firewalls and intrusion detection; we've fortified the desktop with anti-spyware and antivirus. But then the attack vectors moved to something that was less secure, which is the application layer. Why? Because humans don't write perfect code."
Malware is no longer one program running in isolation. Security researchers have watched malicious code evolve into interconnected systems that propagate self-replicating executables capable of posing as authorised processes. Preventative measures do not work very well against such targeted attacks. That is where AccessData comes in.
"Preventative defences are great and reduce a lot of noise, but if you're dealing with a targeted attack, or even an untargeted attack, there's going to be a Victim Zero," said Lucas Zaichkowsky, enterprise defence architect, AccessData.
"How many years have we been trying to stop [attackers from reaching] Victim Zero? And then, once [attackers] are in, they escalate privilege, get user accounts and then move around from system to system, find the data they're after and steal it. And we miss that entire remainder of the attack lifecycle."
"The solutions we provide give you holistic visibility of the end-point; the network, including SSL decryption; and being able to consume threat intelligence in multiple formats."