For the average analyst of the security, it is no secret that their days are overloaded with more moments of hair on fire as compared to Zen moments.
The 2016 SANS Incident Response Survey paints a sobering and quite clear picture of the demands being placed on the analysts of security. The lists of the survey, in order, the following impediments to the effective response of the incident:
- Lack of proper skills and staffing.
- Not enough domains and visibility across systems.
- Lack of budget for required tools or technology.
- Processes and owners are not clearly defined.
- Organizational siloes.
- Difficulties in detecting attacks that are very sophisticated.
All of the above results present in:
- Further weight on the shoulders of your analyst.
- A lot of dwell time in mean-time-to-remediate (MTTR).
So the McAfee finally get it. You have got too many unknowns, not enough insight that is quite relevant, and technologies and functions tripping over each other trying to help properly sort out what is really going on with the technology. Your analysts need a technology security partner to help properly investigate, detect and remediate today’s never-ending sources of the threat For more information on McAfee Antivirus, you can visit McAfee.com/Activate.
As the responsibilities and threats have expanded, the role of the event management and security information (SIEM) solution has combined into one of the greatest assets that an analyst has, becoming the Swiss Army Knife of the response of the incident and orchestration. Furthermore, you reach to your SIEM for analytics that is very advanced including behavior and user analysis, data and application monitoring, and real-time monitoring. The issue, as Barbara Kay outlines in her article, that is named as Eating an Elephant: Actually how the ESM 10 UX team reenergized SecOps, is exactly the amount of data and information that the average analyst has to retain as he or she swivels from the response of the incident to McAfee advanced threat management to the monitoring of the user.
So as your SOC generally makes the move to a lot more proactive McAfee threat management and contextual analysis, predictive and orchestration, we are evolving McAfee Enterprise Security Manager (ESM) to completely reduce the cognitive strain, and automate and guide more of the tasks of the daily routine, such as incident tracking, watchlist management and advanced correlation rule set-up, so that you can completely focus on the very critical responsibilities of decision-making. McAfee ESM 10.0 is quite an important step in that evolution.
As more changes are being rolled out, we want to make it quite easier for you to find the data and information that you require and to stay completely informed. So we are providing some brand new communications tools for you beginning this particular month.
John Short is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cybersecurity, malware, social engineering, Games,internet and new media. He writes for mcafee products at mcafee.com/activate or www.mcafee.com/activate.