Dan's Take
Fortscale and the Enemy Inside
It's often an unethical employee that causes the biggest security headaches for organizations.
- By Dan Kusnetzky
- 02/12/2015
Fortscale's Idan Tendler, CEO and co-founder, came by to discuss what his company has been doing since our last conversation at the Splunk user group conference roughly a year ago. Each time I have the opportunity to speak with him, I learn something more about how analysis of the organization's operational and machine logs can help.
This time Tendler pointed out that many of today's security breaches or thefts of customer data can be attributed either to malicious staff behavior, or staff not following the enterprise's data governance or security policies.
Staffers are typically given access to many of the organization's data assets. They're trusted to use them appropriately and follow the organization's guidelines and policies. Unfortunately, a few take advantage of the access granted them to gather data either for their own benefit or to sell to others.
The organization's operational or machine logs have information that could help them understand when and if applications or data were accessed at inappropriate times or places; or, perhaps, from an individual posing as a staff member through misuse of that staff member's credentials.
Predictive Analysis
Unfortunately, by the time the organization learns of the abuse, the data is already in outsiders' hands. Fortscale believes that its predictive analysis tools can help detect this activity in time to prevent this type of loss.
Tendler believes that many IT and business decision-makers are thinking about today's security issues in the wrong way. They're thinking about blunting a specific attack, rather than understanding that the danger lies in a long-term, slow, deliberate, campaign that results in "burrowing and harvesting" data deep within the network. If Fortscale's data is correct, these campaigns can be underway for months or even years before they're detected. The company says the average attack lasts 356 days.
Fortscale says that covert campaigns of this type often employ legitimate user identities, so the typical password protection schemes won't be effective. The attackers have learned how to use sophisticated combinations of technology and sociological tools as part of their attacks.
Fortscale believes that a new approach is needed to secure enterprise networks and protect their intellectual property. And the key to that approach is producing proactive intelligence using Big Data Security Analytics as a foundation of the enterprise's approach to security.
Fortscale describes the use of Big Data for security analytics this way:
Big Data Analytics for Security refers to a process of analyzing massive amounts of structured and unstructured data from hundreds of sources – including system logs, network devices, IP addresses, emails, conclusive information derived from other attack investigations, third party research and more – in order to recognize patterns or anomalies, analyze trends, verify alerts and security events, and ultimately help organizations discover and neutralize advanced cyber attacks or under the radar threats.
Dan's Take: Forensic Analysis Is Now a Business Requirement
The only practical way to address today's threats is the careful analysis of both current and historical data. This means rapidly sifting through huge amounts of operational and log data to ferret out the evidence of individual attacks, long-term campaigns and the malicious use of a staff member's security credentials.
The challenge Fortscale has addressed itself to is more than finding a needle in a haystack. It is finding the right needle in a huge mound of other needles. Each point of data is likely to be only marginally useful all by itself. When the data points looking for patterns of user behavior are analyzed, the "norm" can be defined and anomalous behavior then be detected.
Having seen several Fortscale demonstrations, I was really impressed by the company's ability to put all the pieces of the puzzle together to make it possible for the enterprise's IT staff to discover problems while they're still very small, and prevent future issues.
About the Author
Daniel Kusnetzky, a reformed software engineer and product manager, founded Kusnetzky Group LLC in 2006. He's literally written the book on virtualization and often comments on cloud computing, mobility and systems software. He has been a business unit manager at a hardware company and head of corporate marketing and strategy at a software company.