Distinguishing 'True' Malicious Security Threats

By Gina Roos  |  Posted 2016-05-17

On average, organizations experience nearly 5,800 suspicious activities monthly, according to a recent survey from cloud security specialist CloudLock that analyzed the daily behavior of 10 million users, 1 billion files and 140,000 cloud apps. One of the biggest challenges organizations face with thousands of suspicious or unusual activities is determining which ones hold the biggest potential threats. The research offers a methodology designed to help security professionals focus on user activities that exhibit a higher level of threat. It centers on an adaptive security model that includes threat intelligence, cloud vulnerability insight, cyber research, community intelligence, centralized policies and contextual analysis. Organizations, particularly those that don’t have the internal IT resources, can work with service providers with a strong security practice to develop a program that pulls together all of these predictive and preventive capabilities. Channel Insider examines key findings from the study.


Submit a Comment

Loading Comments...

By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

Thanks for your registration, follow us on our social networks to keep up-to-date