Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Crisis Averted: How Threat Intelligence Prevents Data Breaches

August 13, 2017

Crisis Averted: How Threat Intelligence Prevents Data Breaches

Cyberattacks and data breaches are nothing new to the enterprise, which has been contending with outside threats ever since the business world went digital and moved its operations online. But today's threat landscape is dramatically different from the threat landscape of a decade ago, or even five years ago. More and more threats emerge every day, and as more and more resources connect to the Internet, cybercriminals are finding ever more ingenious ways to hack the enterprise. Just ask Target or The Home Depot.

In such a risky environment, organizations can no longer depend on the network security technologies that have served them well in the past. The growth of cloud computing in large enterprise environments renders traditional perimeter security measures like firewalls and network access control (NAC) less than adequate to protect sensitive corporate data. Meanwhile, the essentially reactive nature of traditional antivirus and malware protection endpoint software leaves numerous vulnerabilities for zero-day exploits: the periods between patch releases are rife with new attacks.

Fortunately for the security- or compliance-conscious organization, today's technology trends also hold out hope for newer and better cybersecurity solutions. Among those trends, Big Data analytics is one of the most promising. A number of major security firms now take advantage of Big Data's ability to harvest and rapidly analyze all kinds of data. These firms use Big Data analytics to crowdsource large-scale threat and cybersecurity databases, which their security solutions can then leverage for much more rapid and accurate threat detection.

The use of this kind of threat intelligence promises to prevent data breaches much more effectively than the reactive cybersecurity technologies of the past could. In very broad strokes, this is how it works:

  • Infrastructure or endpoint security solutions at Enterprise A detect anomalous activity. In the course of quarantining and analysis, the anomalous activity is determined to be malicious and data about it is uploaded to the centralized threat intelligence database.
  • The same type of anomalous activity is detected at Enterprise B, but this time, security solutions connected to the threat intelligence database are able to immediately recognize the behavior as malicious and address it at once. Yet more data are added to the database.
  • Lather, rinse, and repeat at every organization whose security architecture connects to the threat intelligence database. A large number of potential attacks and data breaches are stopped in their tracks, before a single organization is breached. Disaster is averted anywhere the threat intelligence database is in use.

Cloud computing offers many ways to further leverage threat intelligence, too. Many security firms now offer cloud-based sandboxing and threat analysis, quarantining suspicious activities in a safe, cloud-based environment where the code is allowed to run and deliver its payload in order to provide yet more information about the virus or malware for the threat intelligence database.

What it all adds up to is increased security that is delivered in real time, protecting enterprises as they are probed rather than after the fact. Disasters are averted, and organizations can do business as usual.

Are you ready to begin offering threat intelligence services to your customers? If you need to learn more, speak with an Ingram Micro Networking and Security specialist today.