|
| |||
|
|
Top Five Features to Look for in a Visibility Solution Michael Fimin is CEO and co-founder of Netwrix. The IT marketing community is masterful at creating buzz words — “big data,” “cloud,” the “Internet of Things,” “artificial intelligence” and more. Now the new buzz word “visibility” is popping up everywhere. During the RSA Conference 2016, nearly every vendor talked about visibility when discussing solutions that cover a certain part of the IT infrastructure or solve a particular problem. Visibility was widely discussed during sessions, and for the second year in a row, Amit Yoran, president of RSA, mentioned visibility in his speech, calling it a core part of any security strategy. Just what does it actually mean to have visibility? If we can’t see what is happening with sensitive data and systems, we simply cannot claim our IT infrastructure is secure. But just collecting log events without extracting meaningful data is of limited value — investigating incidents takes too long, and you can’t adjust your cyber-security strategy quickly to address emerging risks. Visibility provides the background information that gives context and helps you to better understand how your employees interact with corporate data. Visibility into what is going on across the entire IT infrastructure is a key component of any cyber security strategy. However, the recently released 2016 Netwrix Visibility Report revealed that organizations worldwide still struggle to gain complete visibility into their IT infrastructures. Most companies lack visibility across their IT networks (65 percent), unstructured data and files storage (78 percent), and cloud or hybrid environments (75 percent). The majority of the respondents had either zero or limited visibility into regular and privileged user activity, including the activity of third parties. Any IT pro who looks at the variety of “visibility” offerings from different vendors can easily get lost. It’s critical to dig deep and ask what the differences are between these solutions. Here are a few key features to look for:
According to the Netwrix 2016 IT Risks Report, 78 percent of organizations believe that visibility into IT changes improves IT security and data governance. Deep visibility into every level of the IT infrastructure gives you control and provides the context you need to quickly respond to cyber security incidents. By being able to quickly correlate user activities with changes to data and security configurations, you can detect misbehavior in a timely fashion and minimize the damage from security incidents. Industry Perspectives is a content channel at Data Center Knowledge highlighting thought leadership in the data center arena. See our guidelines and submission process for information on participating. View previously published Industry Perspectives in our Knowledge Library. |
|||||||||||||