SHARE
Facebook X Pinterest WhatsApp

NetCitadel Applies Analytics to Security Intelligence

The Impact of Advanced Persistent Threats to Enterprises A world of difference exists between discovering a potential security threat and actually understanding the amount of potential harm it could cause. Looking to give IT organizations access to a set of analytics applications that allows them to visually see how lethal any given security threat might […]

Written By
MV
Mike Vizard
Nov 20, 2013
Slide Show

The Impact of Advanced Persistent Threats to Enterprises

A world of difference exists between discovering a potential security threat and actually understanding the amount of potential harm it could cause.

Looking to give IT organizations access to a set of analytics applications that allows them to visually see how lethal any given security threat might be, NetCitadel this week made available NetCitadel ThreatOptics, an analytics application that gets applied against the threats discovered by the company’s security intelligence cloud platform.

NetCitadel CEO Mike Horn says NetCitadel ThreatOptics is designed to provide the context that is so often missing when trying to identify threats. The sheer volume of threats, says Horn, makes it exceedingly difficult to identify threats, such as advanced persistent threats, that are a lot more lethal than garden-variety malware.

NetCitadel ThreatOptics also integrates with multiple existing security devices, such as firewalls and web proxies, to help IT organizations respond to security threats in real time.

By providing an analytics capability, NetCitadel ThreatOptics reduces the security fatigue that so often results in IT organizations not actually discovering serious security threats because of the sheer volume of attacks they are trying to cope with every day.

viz20131120-01

The ultimate goal, says Horn, is to reduce the time it takes to automate the remediation of those threats. Once that capability is in place, Horn says the cost of launching a successful security attack starts to escalate for the purveyors of malware, who generally then focus their efforts on targets that are more easily compromised.

Existing security information event management (SIEM) tools provide ways to capture data about security threats. But Horn says the first generation of these tools doesn’t do much to help security teams verify and prioritize security threats. As a result, NetCitadel and a host of other security vendors are racing to deliver next-generation security intelligence services via the cloud.

Weeks, sometimes months, can go by before a security team discovers a security threat. While that security threat clearly represents an injury, the insult comes when it takes multiple days for the IT team to first understand the extent of that threat and then ultimately completely remediate the vulnerability.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top RPA Tools 2022: Robotic Process Automation Software
Jenn Fulmer
Aug 24, 2022
Metaverse’s Biggest Potential Is In Enterprises
Tom Taulli
Aug 18, 2022
The Value of the Metaverse for Small Businesses
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.