July 31, 2012

Cover Story

CEO of the Year

Utah’s business landscape is rich with professionals who have le...Read More

Featured Articles

Did you go Skiing this winter?

Around Utah

Sections

Spotlight
Martin Plaehn

Spotlight
Karen Sendelback

Legal Briefs
Social Media and Employers: Friends or Enemies?

Money Talk
The Case for HSAs

Economic Insight
Time to Show Up

Lessons Learned
Make a Move

TechKnowledge
In the Lab

EntrepreneurEdge
Rent to Own

Business Trends
Back from the Dead

Executive Living
Artful Inspiration

Features
A Breath of Fresh Air

Features
Worst-Case Scenario

Regional Report
Northern Utah

Focus
Measure Up

Industry Outlook
Travel & Tourism

Players
Players

Article

AccessData Releases CIRT Version 2

Press Release

July 31, 2012

AccessData announced the release of Cyber Intelligence & Response Technology Version 2 (CIRT 2). CIRT is a platform that integrates network and computer forensics, malware analysis, large-scale data auditing and remediation. The solution is an integration of four of AccessData’s proprietary technologies: the AD Enterprise network-enabled computer forensics solution, SilentRunner network forensics product, the data auditing capabilities of AD eDiscovery and — new in version 2 — AccessData’s new Cerberus malware analysis technology.

Traditionally, organizations rely on a number of disparate tools for information assurance and incident response. There are often multiple teams each focusing on one small aspect of a much larger cyber security picture. For example, a forensics team, a network security team, information assurance or compliance auditing team each use different tools and may or may not collaborate on a routine basis. According to Jason Mical, director of network forensics at AccessData, these gaps in technologies and processes make it difficult for an organization to quickly identify when a security breach or data leak has occurred. Since perimeter defense and alerting technologies can only detect what they’ve been told to look for, the ability to catch what tools, such as intrusion detection (IDS) and data loss prevention (DLP) systems, miss is absolutely vital.

“Today, when an organization discovers it has been compromised, it’s often by accident, and usually long after widespread damage has occurred. CIRT is designed to provide 360-degree visibility into what is happening on your network to speed detection, root cause analysis and thorough remediation,” stated Mical.

By allowing users to correlate computer, network and malware data, as well as audit tens of thousands of machines, CIRT gives organizations the ability to identify and address all types of threats, including zero-day events, hacking, data spillage and advanced persistent threats. “In the age of Stuxnet and Flame, organizations need the visibility and response capabilities CIRT provides,” commented Mical.

“It’s not just another platform that provides a mound of data to sift through. It delivers the threat intelligence you need and it remediates.” Using CIRT, organizations can continuously monitor network traffic, computers and removable media to detect threats and more quickly acquire actionable intelligence in the event of a cyber incident. In addition, with CIRT’s “check in” feature, CIRT users can monitor the laptops of traveling employees, even when they are not logged on to the organization’s network.

One platform providing a single pane of glass through which users can see what is happening on the network and at the host level has been the vision of AccessData CEO, Tim Leehealey for the last decade. Key features of AccessData’s Cyber Intelligence & Response Technology include the following:

  • Correlate network and host analysis to quickly determine root cause and more effectively chase down data spillage.
  • Identify and triage suspected malware using both static analysis and advanced disassembly analysis to determine behavior and intent without a sandbox or reliance on signature-based tools.
  • Perform proactive and reactive enterprise audits to identify data spillage, such as personally identifiable information, payment card information or classified documents.
  • Play back security incidents in real-time to gain a better understanding of an exploit or data spill.
  • Build threat profiles and monitor to prevent incident recurrence.
  • Continuously monitor the network and information assets, including removable devices, on or off the organization’s network.
  • Perform batch remediation.

“By providing integrated analysis from multiple vantage points, as well as real-time collaboration among personnel and easy-to-read reporting for those at the top of the command chain, AccessData’s CIRT solution is the only product of its kind, engineered to better aid organizations in their efforts to stop the bleeding,” said Leehealey.

Utah Business Social
UB Events View All
2014 Fast 50 EventUtah Business Event
Aug 28, 2014
Utah Business magazine along with presenting sponsors Kirton McConkie, CBIZ, MHM, LLC and Newmark...
Community Events View All
62nd Annual Utah State History Conference
Aug 25, 2014
Thirteen thousand years of Utah's history will come alive through nearly 60 presentations on Utah...
Linux LPIC-1 Exam Prep Course 1
Aug 27, 2014
Designed to provide the essential skills needed to be proficient at the UNIX or Linux command lin...

info@utahbusiness.com  |  90 South 400 West, Ste 650 Salt Lake City, Utah 84101   |  (801) 568-0114

Advertise with Utah Business

Submit an Event

* indicates required information
* Event Name:
Price (general):
Website (if applicable):
Coordinator's Name:
Coordinator's Email:
Coordinator's Phone:
Venue Name:
Venue Address:
Venue City:
Venue Zip:
Event Capacity:
Date(s):
to
* Event Description:
  Cancel