Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE
Stealthbits

Market Trends: The Risk Factor

Blog >Market Trends: The Risk Factor

Authentication-based attacks remain a primary concern for many of our clients no matter the size or sector of their organization. While knowledge of these threats has increased, understanding the risk factors – and how to remediate them – has not.

Most attacks are premised on stealing data for financial gain, and obtaining access is only the first step. Figuring out where valuable data is located, how it’s protected, and ultimately how to access it will take any infiltrator significant time. So, unsurprisingly, authentication-based attacks go undiscovered for more than 200 days on average. It seems obvious why: to get access to data, one needs a valid identity, and with a valid identity, log files (which is what most existing threat detection solutions are based on) have nothing anomalous to detect! This is why solutions are now starting to come to market based on ‘User Behavior Analytics’ (UBA). Over time, atypical behaviors trend, and UBA systems, in theory, will alert if deviation from an individual’s own – or their peer group’s – activity occurs.

Don’t miss a post! Subscribe to The Insider Threat Security Blog here:

Loading

Featured Asset

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL