Welcome to the Narus Blog
Posted by John Trobough on April 09, 2014
The nature of digital technology is changing. “Digital” no longer lives on the Internet, or laptops and mobile devices. It’s everywhere. In our hands. In household goods and appliances. It’s in our friendships and work connections. Digital technology now connects everything and everyone around us. People are hyper-connected – always on, always moving and roaming seamlessly from network to network with their many different devices. This shift has brought us closer to each other, given us instant access to information and news and created an enormous, exponentially increasing amount of digital information. Most importantly, this has exponentially increased the interdependency we have on each other—and on the reliability and security of that digital connection.
However, in this age of big data, with this explosion in digital interdependency comes increased security risks. To date, organizations have been obsessed with “keeping the bad guys out,” but what we’ve come to realize is that, sooner or later, the bad guys are going to get in. So the question shifts from “what would we do if I got hacked,” but rather “what will we do when we get hacked.” It’s less about intrusion prevention and more about intrusion recovery.
Gartner agrees. In a recent report they discussed how enterprises are overly dependent on blocking and preventing hacks and decreasingly effective against those that actually get through.
Luckily, Narus has been tackling this question for quite some time. As pioneers in cyber security data analytics, we’ve been partnering tirelessly with enterprise, telco and government clients around the world to research, develop and deploy the next breakthroughs in cyber security. We help customers visualize security threats intuitively and immediately, and give them the context they need to understand what’s happening, where, and why. Most importantly, our technology gives them the ability to make the right decision right now and get back to business as usual as quickly as possible. This context and visualization is absolutely essential in this new world order of security.
It’s not about developing a static defense. It’s about accelerating your learning curve. The cyber security world moves fast, and it’s only getting faster. Hackers are getting smarter, more resourceful and bolder every day. And it’s time for enterprises, telcos and government agencies to shift from playing defense and figure out how to get one step ahead. It’s time to embrace the reality of omnipresent security threats and design security architectures that are resilient and aware and can help CISOs make sure these everpresent threats don’t impact their bottom line.
And that’s why Narus exists. That's what we do in partnership with our customers each and every day. And that’s what this blog is all about.
nBlog will address the most common questions and concerns around cyber security, but we will also ask the questions people aren’t asking but should. What does security look like in the new world order of cloud, big data, mobile and social? Is intrusion prevention dead? What’s the positive business impact of intuitively visualizing security threats? And on the other hand, what’s the cost of doing nothing?
Through this open dialogue, we will tackle myths, share best practices, and help CISOs everywhere shift from playing defense to playing offense. Together, we will discover that security is more than a defensive, reactive technology—it’s an enabling technology that unlocks the business value of our most disruptive technologies. And together, we will shape the future of security.
Welcome to the discussion.
###
Cybersecurity: The Importance of Staying Current
Posted by John Trobough on December 08, 2014
The cybersecurity space is perpetually evolving in complexity. Hardly a day goes by without news of a cyber threat or major security breach, and each cyber criminal seems to be more innovative than the last. So how do we prepare our organizations for the next generation of attacks?
According to the SANS Institute, one of the best ways to make sure company employees will not make costly errors is to institute company-wide security awareness training initiatives. These include classroom-style training sessions, security awareness websites and helpful hints. These are great ways to help ensure employees at all levels have a solid understanding of company security policies and procedures. This also helps more seasoned IT security professionals keep inside threats more manageable. Cyber criminals are constantly innovating, meaning our IT security experts have to be on top of industry trends and new technology.
Here at Narus, we believe in continuous cybersecurity education and training. Below are some best practices for staying current in the field:
Attend Webinars: Webinars bring together the best in information security strategies, technology and insight from industry thought leaders and analysts. For many sessions, attendees can even earn continued professional education (CPE) credits. Challenge yourself and your organization’s employees to learn something new every day. Infosecurity Magazine has a great list of upcoming webinars.
Read the News: This may sound obvious, but nevertheless it’s important. Stay on top of new technologies, hacking organizations and government regulations. The more information you and your employees have, the better your strategies will be.
Participate in Industry Conferences: Cybersecurity conferences – like RSA – help drive the security information worldwide and attract some of the world’s brightest thinkers in the IT security field – even hackers. These conferences also address important technology issues, including privacy, application and mobile security, identity and access management, and others. They are great for networking too!
There is no doubt that the cybersecurity landscape is going through a transformation. As organizations and governments try to solve seemingly endless security dilemmas, we must remember how important it is to keep our skills up to date in the battle to thwart cyber criminals in the meantime.
###
We Are the Weakest Link
Posted by John Trobough on December 01, 2014
As technology continues to improve, human error remains the biggest challenge for security. In order to be effective at our jobs, we are required to share, collaborate and communicate. An unfortunate side effect of the “social” aspect of our jobs is that it increases the risk of a security breach. A global analysis of breaches conducted by the Ponemon Institute found that as many as 35 percent of breaches “were caused by a negligent employee or contractor (human factor).”
The human element has always been the weakest link when it comes to securing data. Human nature drives against the grain of best practices in security. Think of the tradeoff between a complex password that’s hard to remember and a simple one that’s easier to remember but more likely to be compromised. Despite improvements in technology, we continue to be our worst enemies where security is concerned.
Perceptive Predators
Hackers are adept at breaking systems, but more often than not they prey on human weakness to gain entry – including non-malicious behaviors like human curiosity or forgetfulness. Sometimes employees aren’t aware of the danger of clicking on links in emails; other times they accidentally leave data in locations that lack sufficient security controls.
The Limits of Lock Down
Even if the vast majority of employees are careful and compliant, sooner or later one will make a mistake that enables a hacker to gain access to the system. Layering on ever greater levels of security to “lock down” company IT is often counterproductive. Employees become frustrated and will find workarounds including developing their own systems and applications outside of the IT team’s control. Lockdowns also come with the undesirable consequence of limiting the sharing and collaboration often required for employees to do their jobs.
What You Can Do to Prepare
Enterprises should prepare for a breach. It’s inevitable that a hacker will gain access to your systems, whether through human error or a previously undetected weakness in security. It’s important that steps are taken to minimize risk and ensure the business can identify and resolve any breach quickly. Some key steps to include in a security program are:
Educate Employees on the Latest Dangers – While employees will inevitably make mistakes and have limited time to absorb feedback on security, it’s important that IT explain new and evolving threats to the business. Describe threats succinctly and give guidance on how to avoid the threats and actions to take if a breach is suspected.
Structure Security Resources Around Critical Data and Infrastructure – IT will be hard-pressed to defend all data and infrastructure across every part of the business. Layer your defenses around the most valuable data first. This requires the classification of data and use of additional tools to deliver holistic assessment of security threats across the environment so the right controls can be applied to the applicable defenses.
Enhance Awareness through Analytics – Security analytics can play a key role in detecting anomalies that indicate a breach. Ensure that the analytics can detect anomalies, ranging from simple volumetrics to complex behavior. This will help you find the critical “needle in the haystack” quickly. Make sure that the analytics platform provides intuitive visualization of the information since this leads to faster diagnosis and rapid resolution of a breach incident.
These three steps aren’t all encompassing, however, and should be seen as just one part of a broader security strategy. It is paramount to consider security with a holistic mindset. Security analytics and data visualization capabilities should be high on every IT team’s implementation roadmap. There has never been a better time to rethink traditional security strategies than today.
###
What BYOD Means For Your Cybersecurity Policy
Posted by John Trobough on November 24, 2014
Today’s cyber criminals are constantly tweaking their tactics to get past network defenses. At the same time, more enterprises are accepting bring-your-own device (BYOD) policies, which may be a boon for business productivity but is a serious concern for those tasked with keeping the network secure. Not only is there a heightened risk of confidential documents leaking out through the network, but with BYOD, employees’ personal information is also at risk.
It isn’t the device itself, but the applications installed on the devices that pose a risk within BYOD. When employees download and install applications for their personal use, they are allowing unregulated third-party access to other sensitive, corporate and personal information stored on the device. These applications may be infected with harmful malware, which can be used by hackers to steal valuable data and personal information. Unfortunately, hackers only need to do their job right once to cause significant damage, meaning just one employee’s security threat has the potential to create a much larger issue for the company.
To address this challenge, many companies implement a bring-your-own-application (BYOA) strategy that involves separating corporate and personal data on the device using mobile application management (MAM). While isolating applications that have access to critical data is a required approach, this still leaves room for data leakage and vulnerabilities. We recommend organizations take an application-centric approach to cybersecurity, and the first step is awareness.
Once organizations become application aware, or know what applications are on the network, the next step is to identify the behavior and nature of applications so that they can use that insight to prevent or allow access to the applications, rather than blacklisting a specific device. Taking an application-centric approach is another step toward a safer network.
But companies need to go further. To improve a company’s cybersecurity protection, security systems must also be reinforced by a robust and in-depth breach response strategy. This includes gathering intelligence about the threat, the ability to visualize information about the occurrence and applying analytics that incorporate information about the applications, to identify root causes and resolve security breaches quickly.
###
Cybersecurity: A Game of Thieves & Castles
Posted by John Trobough on November 11, 2014
It’s clear that today’s enterprises are on the front lines of a cyber siege with a growing list of high-profile attacks. Hackers are only becoming more skillful and advanced, waiting for the opportune time to attack.
A recent TechAmerica survey found that CIOs and CISOs identified cybersecurity as their number one priority this year. This coupled with a rash of new studies that raised cybersecurity concerns and found that enterprises are ill prepared for a cyber attack, is a cause for concern.
I recently wrote an article for SC Magazine highlighting how today’s enterprises need to fortify their networks: build a castle with tall walls, a deep moat and draw bridge in order to protect what matters to them most – their intellectual property and revenue. Cyber attacks are inevitable, but what separates a prepared company is with multiple layers of security enabling it to react and resolve the problem quickly. However to make this happen, open communication across the entire C-suite is critical.
The business impact of a cyber attack goes beyond the immediate. A recent study by the Ponemon Institute found the annual cost of cybercrime for 60 organizations was $11.6 million per year. That’s more than just pocket change, so it’s the CISO’s responsibility to help the entire C-suite understand the deep impact of a cyber attack by translating it to business terms. In many cases, companies are so busy securing their perimeter that they haven’t even thought about the bigger picture. Perimeter tools are still valuable as primary defense solutions – like the castle wall – but organizations need to take a holistic approach with multiple layers of security measures.
Narus nSystem is the missing layer for most enterprises trying to protect their castle walls – it is the water needed in a dry moat.
First off, nSystem plays nicely with an enterprise’s existing security investments without disturbing the infrastructure. nSystem takes a holistic, integrated, analyst-centric approach to detecting, alerting, mitigating and resolving security threats as quickly as possible, while helping security teams make the most of their existing security investments and staffing.
Security analysts are suffering from data overload, but with Narus nSystem teams are able to rapidly detect and counter real threats due to the rich context provided, enabling it to instantly correlate network, user, place, and application level information for richer context around an incident. In addition, Narus nSystem’s visualization provides the context in a digestible manner so security teams are able to act quickly.
In light of all the recent attacks, executives should be asking themselves, “Is my enterprise fortified like a castle with multiple levels of cybersecurity measures to help respond faster?”
###
Don’t Forget the Security Basics
Posted by John Trobough on October 27, 2014
To address today’s diverse threat landscape, you need the right technology to secure your organization. Here, at Narus, we believe in taking a holistic approach to cybersecurity, and that means knowing the basics.
October is Cybersecurity Awareness Month, so there’s no better time to give a refresher course on the basic practices all professionals should keep in mind to keep their organizations protected.
Password Training
If you still use “123456” or “password” as a password – stop! Passwords should be complex and hard to crack. They should be 12 characters or more and a mix of letters and numbers. According to online security expert Robert Siciliano, a good approach to picking a password is converting a phrase into an acronym. For example, the phrase “Narus believes in taking a holistic approach to cybersecurity in today’s threat landscape” would be “Nbitahatcittl.”
Don’t reuse passwords. While it may be convenient to use the same password for all your different accounts, just one breach can jeopardize the security on all your accounts. And don’t store your passwords. Yes, it’s convenient to have various passwords saved on your browser or smartphone, but it puts your organization’s security at risk.
Keep Your Anti-Virus Program Up to Date
Make sure your anti-virus program is always using the latest software. A recent study found that 25 percent of computers in the U.S. are not using the latest anti-virus software – an alarming figure in light of all the recent hacks.
While anti-virus software will not detect everything that enters the network, it’s a very useful security layer that can protect against a majority of online threats. Without the latest update, you put yourself at risk to a common online threat that could have been easily detected.
Back It Up
Ensure all your data is properly backed up. If your data is stored on the cloud, it’s especially important to keep a local back up. You shouldn’t assume your back up will work. Make sure to test so you’re confident you’ll be able to recover your data when you need it.
It’s important to keep these basic security tips in mind all year round, not just during Cybersecurity Awareness Month. Combine these tips with a holistic cybersecurity approach and your organization is on its way to advanced cybersecurity infrastructure.
###
Who is Coming to Get You? The Many Faces of Hackers
Posted by John Trobough on October 20, 2014
The only defense against the world is a thorough knowledge of it.”
― John Locke, Some Thoughts Concerning Education
We live in a complex and fast moving world, and the number of hacking attacks that enterprises face continues to grow each year. The associated cost of a breach is also rising. Hackers come in many shapes and sizes and utilize a broad range of attacks to steal valuable data, compromise networks and servers. By understanding an enemy’s strategy, you have a better chance of defeating him.
For security teams with finite resources this poses an operational dilemma – how can I best focus my efforts on protecting my business? Who is most likely to attack my business? What does this mean for my security strategy? Figuring out the type of hacker who is most likely to target your business can make a real difference to your ability to monitor andprotect your data and IT infrastructure. To prevent security breaches, organizations must understand not only the types of attacks they are likely to face, but also the motivations of the hackers.
We’ve put together an infographic to portray the types of hackers that enterprises often face – the types of attacks they’re most likely to deploy, the industries on which they focus and the types of data they target.
Here are some starting questions to consider when assessing possible hacker behaviors vs. your security posture:
Which data and infrastructure are most critical to my business and have the most value to a hacker?
Which type of hacker is most likely to go after this data and IT infrastructure?
Which processes and tools can help me detect hacking activity?
No enterprise can guarantee 100 percent security across all parts of the business. There are too many ways to breach a perimeter, and sadly hackers have all the time they need to work around defenses. As a result, security defenses must be reinforced by a robust and in-depth breach response strategy. The ability to visualize a breach occurrence through analytics is vitalto identifying and resolving security breaches.
###
Cybersecurity and the Cost of Doing Nothing
Posted by John Trobough on September 30, 2014
As executives drive the success of cloud, mobile and big data initiatives, security threats are becoming harder to detect, predict and control. However, it’s important that security doesn’t get shortchanged, especially when the average cyber attack takes 32 days to resolve, costing $32,469 a day.
While the return on investment (ROI) from these programs is critical, the ROI from securing them is harder to calculate. How do you measure something that did not happen, and how can you attribute prevention to the measures you put in place? Like the saying goes, if a tree falls in a forest and no one is around to hear it, does it make a sound?
Cybersecurity did not make Gartner’s list of top ten IT priorities in 2014, despite the fact that without it, big data, mobility and cloud initiatives just don’t work. Meanwhile, chief information officers (CIOs) and chief information security officers (CISOs) remain reactive rather than proactive when it comes to enabling and protecting the organizations’ most important business initiatives. What’s worse, with the rise of bring your own device (BYOD) and the explosion of new applications, organizations often don’t even know what needs protecting until after it’s been hacked.
What if we looked at this differently? What if there were a way to simultaneously protect your most important intellectual property, and protect your networks while enabling disruptive new business models and revenue streams?
Seeing is believing, especially in a security environment plagued by thousands, if not millions, of events every day — many of which are false alarms. A highly-visual, customizable and collaborative interface can save days of manual analysis. Which, in turn, translates into saving thousands of dollars in potential losses, especially in the context of an active breach that not only affects the bottom line, but also damages the organization’s brand name and image.
A properly deployed system must deliver end-to-end visibility and a holistic view of the security and threat landscape. This will help organizations overcome the challenges of a traditional siloed, manual correlation approach to detecting, diagnosing and remediating incidents. By providing CIOs and CISOs the visibility and context needed to make the right security decisions, the system can accelerate the time it takes to resolve threats so executives can get back to business as quickly as possible.
Narus nSystem helps protect and maximize the ROI from existing IT investments and in some cases, even turn risk into opportunity. It combines a holistic approach with state-ofthe-art visual and interactive analytics to enrich the understanding of what’s happening and why, and how to respond in real time, because the cost of not responding quickly is just too high.
###
NFT: Time to Evolve a Beloved Category
Posted by John Trobough on August 21, 2014
As Dylan wrote, “The times they are a-changing.” We continue to move into a brave new world of corporate networks, with new features and landscapes—the extended enterprise, perimeter-less networks, BYOD, big data, ubiquitous mobile, and the onset of the Internet of Things. These new trends promise improved productivity, convenience and business innovation. But those gains continue to be offset by the omnipresent threat of more serious, more surreptitious, and more sophisticated security breaches that take advantage of the new vulnerabilities in our evolving technological topography.
The new challenge this creates is how to stay one step ahead of security risks, and how to remain instantaneously resilient when the inevitable breach does occur. Security has long topped the list of technology and business priorities, but now more than ever bouncing back from an attack is the new name of the game in security, and it's a game organizations of all kind can't afford to lose.
The reason this game is shifting is that we've grown increasingly dependent on our networks, with bigger business bets and more end-user reliance on always-on applications and data. And the more that's at stake, the more we have lose from each new emerging threat. And as we've seen from recent high-profile breaches, the near-term losses in terms of downtime, lost revenue and opportunity is nothing compared to the longer-term losses in brand equity, public trust and corporate reputation. That means the vigilant CISO is no longer satisfied with “forensic tools” that let them solve the mystery of what caused a network breach after-the-fact. That CISO needs to know, see and understand, now, exactly what's happening, where, why and how to fix it. Their company's success—and their own—depends on it.
In short, the long-revered category of “network forensics tools” (NFT) becomes just that—one toolset in a much larger set of capabilities that meet the modern needs of the modern CISO and CIO. It is in this context that we call upon the industry to reexamine and expand the venerable category of the NFTs. Today's environment, business mandates, CISO requirements and the solutions being delivered to meet those requirements have outgrown the old category definition.
It's not just about the data network any more. It is also about the semantics, interactions, and applications that run on that network. And it's about the critical importance of context around when the events and breaches occur. In short, the network is much less important than what's happening on the network. That's the new game.
It's not about after-the-fact “forensics”. Offerings built from the ground up for big data are capable of ingesting and parsing more raw data at wire speeds than ever before. And this enables unprecedented real-time monitoring, alerting, and visualization capabilities. In short, we don't have to look into the past and guess about what to do in the future. We can wrestle with the security problems that are happening right here, right now, and safeguard their future.
It's not about tools, it's about time. Tools are custom-built implements that assume you're doing one repetitive task. But today, CISOs need the sort of powerful, automated machine learning and predictive capabilities of new offerings that can identify breaches in action and sometimes even before they can happen. These aren't tools. These are sophisticated solutions that increase the speed and agility with which companies can discover, understand and resolve security breaches.
At Narus, we have built an offering that meets the demands of the new vigilant CISO. Our customers need to stay one step ahead of the rapidly changing world of cybersecurity. That's why Narus continues to invest in innovation and drive disruptive, research-driven cybersecurity solutions to CISOs everywhere that go so much farther than NFT.
Think about it. Hackers have figured out this new game. Isn't it time we as an industry did, too? Because the times they are a-changing. And it's high time for the category to change, too.
###
Connecting The Dots of Cybersecurity Job Growth
Posted by John Trobough on July 29, 2014
Posted in Entrepreneur
As CEO at Narus, I am lucky enough to surround myself with some of the brightest minds in cybersecurity from both a business and IT perspective. However, it can be easy to overlook the current state of the cybersecurity job market. I recently penned some thoughts on this issue as a contribution toEntrepreneur magazine.
Essentially, there is a disconnect between market needs, the skills gap of the workforce and general awareness about the possibilities for job seekers in our industry. For example, the Bureau of Labor Statistics reported that cybersecurity jobs are expected to grow 53 percent by 2018 and the number of cybersecurity positions doubled in 2013 alone. Despite the obvious opportunities present, a recent study found that 82 percent of 18-to-26-year olds were never told in high school of the opportunities in cybersecurity.
Here at Narus, we are trying to combat some of these issues through our acclaimed fellows program and involvement with higher education institutions, like the Cyber Innovation Center at the Politecnico di Torino, to share our knowledge and collaborate with interested students.
Additionally, Narus tries to connect as much as possible with the general engineering community. We recently held a Tech Talk at our headquarters in Sunnyvale, CA with the Society of Hispanic Professional Engineers (SHPE) to discuss key industry trends in security analytics and promote the growth of our industry.
If you’d like to read more about my thoughts on this topic, head over to Entrepreneur and be sure to share any thoughts in the comments section: http://www.entrepreneur.com/article/235731
###
Security: The Early Years
Posted by John Trobough on April 24, 2014
Looking back on our childhood...there was a time when the “threat landscape” was much simpler. When every activity or game was hide and seek. Our top priorities were to keep from catching cooties and to protect our treasures (whether it was our stamp/sticker/trading card collections or our candy stash). We all had a tree fort, hiding spot or safe area to play in and let our imagination run wild. Any intrusion whether it was from mom, dad, sister or brother, was seen as a threat to exfiltrate said treasures and warranted a full on battle.
When I was younger, my protective artillery included water balloons, NERF guns, inflatable hammers and slingshots, to name a few. In my fantasies, I was MacGyveresque. I was ready to protect myself and defend the perimeter with whatever was lying around if necessary but intent on implementing my strategic defenses (which I would conjure up over hours of daydreaming). My child-like mind was always on the lookout, alert and ready for what might be coming. Preparation was essential for disarming any unforeseen attackers!
Those were the good ol' days...
While today's threats have become increasingly more complex, our defenses have also become more advanced. Ingrained at an early age, you and I both knew the importance of protecting what's personal to us. Whether it's a fort, a teddy bear or our social security number, we must still do what we can to stay on the offense, be aware of our surroundings, remain ready to take action and block intruders from entering and taking what's ours!
Even though the type of threats have changed over the years, the need to protect what's private, personal and ours has not.
This video reminds us of a time when our protective instinct was augmented by our childish imaginations. What we protect and how we do it has evolved, but the desire to do so is inherent.
###
Inside The Target Breach Through the Narus Looking Glass
Posted by John Trobough on April 21, 2014
The Target breach will undoubtedly go down in history as one of the largest retail security hacks (at least until the next big one). While I've shared my initial thoughts with SC Magazine, it's important for us to reflect.
Threats continue to become increasingly more advanced and complex and as a result, data breaches should come as no surprise. Another day, another breach...right? I know, it seems daunting, because as we look at the overall cyber threat landscape, the Target breach is just one of many daily occurrences, just a drop in the ocean. As with every drop, the rippling effects are why it becomes noticeable and memorable. In this case, the breach resulted inpointed fingers and a splash about what Target could've, should've and didn't do.
But we need to be realistic: Target's security team receives an overwhelming stream of alerts and they couldn't distinguish which ones, if any, were real threats. What if they were using a technology that would have changed this outcome?
Let's take a look at the three stages where Narus nSystem could have played a critical role:
Stage 1: Whitelist Violation
The attackers compromised the heating, ventilation and air conditioning (HVAC) credentials... yes, you heard us correctly. The compromised credentials of the HVAC vendor were used to get into a project management/billing application server that the HVAC vendor was meant to access. From the project management/billing application they then moved in by compromising the related application server. I know, it's a lot to take in.
But, this compromise would have been identified by nSystem, alerting Target's security team. The first stage alert given to the security team would have been due to segment boundary crossing where a system from one segment was accessing multiple systems from another sensitive segment (i.e. PoS).
Stage 2: Infiltrating POS Systems
The second alert would have been raised by the lateral movement of the malware into point of sale (PoS) systems. This alert, correlated with the previous, would have enabled nSystem to further profile the malware. It would have been able to identify the file name, MD5, file type, ports used, exploit kits used, origin endpoint and other infected endpoints. If Target's security team had been using nSystem, they would have understood the impact, nature of the malware and infected points.
Stage 3: Data Exfiltration
Lastly, nSystem would have generated alerts when the data was being extracted and moved to staging servers. If the Target security team had failed to take previous action, nSystem would have developed a full profile of the incident and provided the associated confidence level, which would have amplified the threat beyond the acceptable threshold. Or in other words, CODE RED.
At the end of the day, every organization will be the “target” of a breach... if they haven't been already. But what if they had the right security technology in place that would allow IT to respond and help the organization get back to business as quickly as possible?
###
IT Harvest Interview With John Trobough
Posted by John Trobough on April 16, 2014
At this year's RSA Conference, I had the pleasure of sitting down with security expert and industry analyst Richard Stiennon. We talked about a lot of things under the cybersecurity sun and how Narus fits into the picture.
If you want to find out how data analytics accelerate time to resolution, why context is the secret sauce and what wrong question security executives are asking themselves, check out the video below. Trust me, it's worth it!
###Type your paragraph here.
Below are some blogs I posted in 2014 at Narus that I want to share with you.