The 5 best cyber security solutions of 2018

1 min. read
CrowdStrike
Arbor Networks
Fortinet

Share

In the world of cyber security, vendors are continually innovating to stay ahead of the latest threats and vulnerabilities, and each other. Irrespective of platform or environment, device or user, the race is on to utilise the latest techniques - such as automation, artificial intelligence, and machine learning - to create the most robust security posture possible.

At the beginning of 2018, many vendors turned their focus to identity and user management enhancements. The traditional password is therefore becoming less common as a means of logging in, for example. One of the advancements in this area is biometric identification.

Learn about the five best cyber security solutions of 2018 our experts identified so far and how vendors are working to make their products more effective in securing your organization.

Arbor Networks TMS HD1000 DDoS Mitigation

Since 1999, Arbor Networks’ DDoS protection and network visibility solutions have been tested and proven in the world's largest, most complex networks. Arbor has not only set new standards in cyber security by developing innovative functionalities, but the company has also staked its claim as an industry heavyweight by maintaining a 50 per cent market share in the areas it focuses on during the past 20 years.

Specialising in anti-DDoS and network visibility products, Arbor’s cyber security portfolio was historically relatively small. After the company was acquired by Netscout, its integrations have developed and their product portfolio has grown. Most notably is the Arbor TMS HD1000 DDoS Mitigation solution for terabit attacks, announced in April 2018.

The Arbor TMS HD1000 DDoS mitigation solution has double the mitigation capacity compared to the previous version, delivering a 40 per cent reduction in the cost per gigabit of protection delivered.

The Arbor TMS HD1000 removes layer 3-7 attack traffic from your network without disrupting key network services. This enables businesses to set up large-scale DDoS attack protection of up to 400 Gbps in one single appliance, or up to 40Tbps in a single deployment.

As one of the industry’s most advanced alerting, countermeasure, and end-to-end workflow solutions, it provides real-time comprehensive visibility into threats and network traffic, automatically mitigating denial of service attacks. In this way, operators and enterprises can maintain services and network performance without compromise.

CrowdStrike Falcon X

In April 2018 CrowdStrike Falcon X was launched with its promising threat analysis automation. CrowdStrike Falcon X also helps to deliver customised intelligence and Security Operations Center automation for large and small organisations.

Falcon X combines malware search, malware sandboxing and threat intelligence. Whereas in the past it could have taken hours or days, this integrated solution performs comprehensive threat analysis in seconds. Falcon X is capable of sharing indicators of compromise with security tools such as gateways, API security orchestration and firewalls immediately. Along with security alerts to accelerate incident research, Falcon X also provides integrated threat intelligence, streamlining investigative processes and superior security responses.

Considering their primers on the first machine learning-based endpoint security solution, CrowdStrike is definitely a company with a product portfolio worth diving into.

Forcepoint Dynamic Data Protection

Assessing risks and providing proportional, automatic enforcement is far from an easy task. Forcepoint Dynamic Data Protection delivers this capability via its human-centric behaviour analytics. It understands interactions with data across machines, accounts and users.

Forcepoint’s Dynamic Data Protection applies an anonymous behavioural risk score that is continuously updated. This establishes a baseline of “genuine” behaviour for each end-user on an unmanaged or corporate network.

Forcepoint’s intelligence systems, informed by individual risk assessments, then apply a range of security countermeasures to address the identified risk. It’s the industry’s first automated enforcement capability that adapts dynamically, freeing up security analysts so that they can focus on higher-value activities.

Fortinet FortiOS 6.0

Fortinet surprised the industry when it released over 200 new features and capabilities in the third generation of its security fabric FortiOS 6.0. From management analytics and SIEM perspective, FortiOS 6.0 offers centralised management across the entire portfolio.

Leveraging path-aware intelligence, and ensuring customers are receiving appropriate service levels for their most important applications, Fortinet’s SD-WAN toolset looks at applications rather than packets. FortiOS 6.0 expands cloud connectors in order to gain visibility into private clouds such as CMware, NSX and Cisco ACI, as well as public clouds such as Microsoft Azure and Amazon Web Services, and SaaS clouds such as Office365 and Salesforce.

Using a colour-coded system, Fortinet also introduced tagging in its FortiOS 6.0 release. This enables firewalls, objects, interfaces and devices to be marked. In this way, organisations can apply a policy that ensures unsecured mobile devices never have access to intellectual property.

Symantec’s Targeted Attack Analytics

Symantec has opened up its threat detection technology which until now was only used by its internal research team. External customers have been granted access to the company’s threat detection technology, making it easier to discover targeted attacks.

In April Symantec said that Targeted Attack Analytics have the ability to look at all the machines within an enterprise and collate the telemetry with the endpoints, verifying if there is an active attack taking place inside the network. The company said the technology detects more advanced attacks compared to traditional security offerings, improving network security.

Administrators using Targeted Attack Analytics can be alerted to incidents with absolute certainty, instead of just indicating that there's a likelihood or probability that something untoward is taking place.

Discover our holistic, architectural approach to security

Cyber security is one of the biggest challenges your organization faces today. Every organization within every sector is under attack. And the hackers and cybercriminals who launch these attacks are becoming more sophisticated, systematic and destructive.

The only effective approach to security is a holistic, architectural approach – one that is manageable, adaptable, resilient and responsive. With the Infradata Cyber Security solutions you can drive digital business securely.

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.

Updates

More updates