The Leading News & Information Service For The Facilities, Workplace & Built Environment Community

Seeking out the Real Threat

27 November 2015 | Updated 01 January 1970

The cybersecurity specialist to intelligence agencies, Huntsman, claims it has introduced the first Automated Threat Verification (ATV) technology.

Huntsman ATV automatically verifies in seconds whether reported threats are real, if they pose an unacceptable risk to the organisation and what options are available for decision making. By eliminating false alarms and verifying the threats that matter, Huntsman ATV is being offered as bridging the gap between detection and response by instantly sending high priority information to security analysts for their immediate attention.

Given that cyber attacks require quick responses to limit damage, the actual periods organisations and businesses take to recognise and take action can be surprisingly slow. In May 2015 the Ponemon Institute surveyed 350 companies spanning 11 countries to identify the financial risks associated with leaving a businesses exposed to threats.

The study entitled Cost of Data Breach Study: Global Analysis, found that the estimated mean time to identify threats is 206 days with the mean time to contain them at 69 days. The average consolidated total direct and indirect costs of each data breach came to US$3.8 million, representing a 23% increase since 2013. Huntsman argues that these delays are the result of ‘intelligence overload’ caused by the mismatch, yet reliance, of human-scale analysis and interpretation of massive amounts of machine generated data.

The Huntsman Analyst Portal with its ATV technology, is said to eliminate false alarms and identify only the ‘threats that matter’ so analysts can quickly mitigate risks, pinpoint and isolate compromised assets and limit the time-at-risk. By streamlining routine activities and analyst workflows through automation, Huntsman Analyst Portal manages the scale of the analyst operations, simplifies their processes and frees them to be involved in the activities of hunting and security profiling.

“Huntsman has shown an ability to reduce the delays between detection and response through both the elimination of false positives and automation of the threat management process thereby creating a huge win for overburdened response staff,” commented David Monahan, Research Director, Enterprise Management Associates.

Picture: Eliminating unnecessary information to counter potential cyber attacks is claimed to be one of the benefits of the Huntsman Analyst Portal

Article written by Robin Snow | Published 27 November 2015


Related Articles

On Trend - Can Hackers Turn The Heat Off?

Ken Munro of Pan Test Partners has written a blog - the original of which and more pictures can be accessed if you Click Here  Munro says he has found...

 Read Full Article
Andromeda Strained - International Cyber Op Dismantles Botnet

On November 29, the Federal Bureau of Investigation, in close cooperation with the Luneburg Central Criminal Investigation Inspectorate in Germany, Europol’s...

 Read Full Article
NHS Seeks Friendly Fire Power In Cyber War

NHS Digital has announced (Nov 28) a £20m project to boost its ability to support the NHS with its data security - including making funds available to encourage...

 Read Full Article
WannaCry - Don't...Just Learn the Lessons

Earlier this year, ransomware took centre stage in one of the largest outbreaks ever, hitting a huge number of companies across the globe, writes Ravid Circus. There...

 Read Full Article
Phishing Docs and the Digital Signature?

Protecting digital documents and being able to verify that the sender of a file is, in fact, who they say they are, is fast becoming a major concern for many...

 Read Full Article
Ransomware - the Protection Racket

ThisWeekinFM has been making a racket about Cyber Security because vulnerabilities are exploited at a personnel and personal level - where FM's should have some...

 Read Full Article
Who's Taking on the Cyber Men?

One in five businesses have fallen victim to cyber attacks in the past year, according to the results of a survey released this week ending April 21 by the British...

 Read Full Article
Phishing, Crashing and Nicking - a Security Digest

The City of London Police’s National Fraud Intelligence Bureau (NFIB) is urging university staff to take preventative action following more than 100 reports from...

 Read Full Article
What's in a Domain Name?

An analyst report detailing how the Domain Name System (or DNS), which helps address Internet traffic to the correct recipients, is the primary source of data...

 Read Full Article
Ransomware - Universities and Students Under Attack

63% of British universities who responded to a Freedom of Information request made by SentinelOne, admit to being the target of a ransomware attack. Over half, 56%,...

 Read Full Article