SHARE
Facebook X Pinterest WhatsApp

BrightPoint Security Fosters Mutual IT Security Defense

6 Cyber Secrets Setting You Up for Betrayal IT security is almost by definition a team sport. In order to win, IT security analysts need to collaborate. The only way to effectively sort through and prioritize potential threats is to enable as much collaboration as possible among those analysts. To foster that collaboration, BrightPoint Security […]

Written By
MV
Mike Vizard
Feb 29, 2016
Slide Show

6 Cyber Secrets Setting You Up for Betrayal

IT security is almost by definition a team sport. In order to win, IT security analysts need to collaborate. The only way to effectively sort through and prioritize potential threats is to enable as much collaboration as possible among those analysts.

To foster that collaboration, BrightPoint Security has added to its Sentinel Security Command Platform a BrightPoint Security Exchange capability for tracking IT security threats identified using machine learning algorithms.

BrightPoint Security CTO Rich Reybok says IT security analysts need a mechanism through which they can share information about, for example, attack patterns being employed by digital criminals. To facilitate those conversations, analysts using the Sentinel Security Command Platform can now avail themselves of threaded conversations with peers in their Trusted Circles while maintaining the same access control to align with attribution and publishing policies. They can also attach documents, share tools and search conversations for threat data elements. IT analysts can generate queries and orchestrate security information event management (SIEM) and endpoint technologies directly from within those threads.

This latest release adds support for security management tools from Tanium and Intel to the existing support for tools from Carbon Black, Hive, Elastic, HP ArcSight, IBM QRadar, RSA Security Analytics and Splunk.

EmergingThreats

Other new features include an enhanced dashboard for tracking threat trends and associated metrics. For example, IT security analysts can view both their current threat risk rating as well as ratings of others in their Trusted Circle communities. Threat data sources and feeds can also be measured for their effectiveness in identifying critical risks within the context of how much of the IT security budget they consume.

In the wake of the recent Cybersecurity National Action Plan issued by President Barack Obama, Reybok says IT security analysts now have a freer hand when it comes to collaborating. Before, many IT security analysts could not collaborate because there are rules in place that prevent people working in organizations that compete with one another from sharing information. Obviously, IT security is one of those places where a well-intentioned mandate is getting in the way of a greater good. In fact, it apparently takes a presidential order to create a cybersecurity center of excellence and a national testing lab through which companies can legally share attack information.

In the meantime, IT organizations should take a cue from merchants of the old days when confronted with similar threats. Forced to confront piracy on the high seas, merchants shared information and armed convoys of ships that traveled together for their mutual defense. Some ideas, no matter how old they might be, still apply.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.