Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jun 17, 2019

It’s never a bad time to pause and reflect on the vision for your IT security strategy.

GettyImages-912803250.jpg

Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing any bad people from doing bad things?”

It seems like you should be able to answer yes to both, but the reality is that a primary veil of protection versus prevention will have dramatic implications when it comes to dealing with the aftermath of malicious code attempting to enter your environment. Will you have to remediate damage done or just revel in the knowledge that your strategy prevented what others were infected by?

Spending More Doesn’t Equate to Safety

It seems that we spend more and more each year on cyber threat protection, but hackers and breaches still impact most global corporations. The expenses are staggering.  According to Steve Morgan, Editor-In-Chief of CyberSecurity Ventures, the cybersecurity market was worth $120 billion in 2017, up from $3.5 billion in 2004 and “will exceed $1 trillion cumulatively over the next five years, from 2017 to 2021.”

Despite this spend of billions of dollars, the hacker community just seems to get smarter and more effective at evasion. According to Dell Cameron at Gizmodo.com:

“A week hardly passed this year without a major data breach to remind us of how precarious the state of security was throughout 2017. And while I’d love to report otherwise, you’d be hard pressed right now to find anyone in the know who thinks things are looking up.”

Three Security Layer Requirements

Ultimately you will need to establish a security layer that can allow your organization to:

  • Prevent, not remediate: Strengthen your cyber defenses dramatically by preventing attacks before they enter and harm your organization, your customers and your brand. Remediation is costly, prevention is not.
  • Detect the undetected: Identify any malicious or hidden code within incoming data files whether on your network or in a cloud. What you don’t know or cannot see can harm you.
  • Avoid the fire drill: Proactively and radically improve the agility of your cybersecurity. Finally, you can detect and protect against unknown (”zero-day”) risks, so at last, you can take the panic out of cybersecurity.

Static Analysis Prevents Cyberattacks

The addition of Solebit into the Mimecast family gives you a leg up on preventing that one entry into your cyber environment. Further enhancing Mimecast’s cyber resilience platform architecture, Solebit provides powerful threat protection to help customers face today’s broad threat landscape with evasion-aware, signature-less technology. The Solebit solution uses Multi-Tier protection to defend against attacks at different levels of the stack.

Mimecast also recently acquired Ataata for security awareness training expanding Mimecast offerings for cybersecurity awareness capabilities with leading training content, risk scoring and real-world simulation attack scenarios.

Learn more here.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jun 17, 2019

You may also like:

How Many IT Security Tools Do You Need?

How many IT Security tools are you curre…

How many IT Security tools are you currently using to keep y… Read More >

Marc French

by Marc French

Senior Vice President & Chief Trust Officer

Posted Jun 07, 2019

Inadequate Cybersecurity Measures

Good enough security isn't good enough. …

Good enough security isn't good enough. Just checking the c… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jun 06, 2019

Obfuscated Fileless Malware in Cyberattackers' Toolkits: A Closer Look

The latest from Mimecast Research Labs i…

The latest from Mimecast Research Labs includes a malware te… Read More >

Dor Zvi

by Dor Zvi

Security Researcher, Mimecast

Posted May 31, 2019