Guidance Software to participate at (ISC)2 SecureDubai 2016
EnForce Risk Manager is purposefully-designed to proactively identify, classify, and remediate private or sensitive data across the enterprise
Guidance Software, makers of EnCase®, the gold standard in forensic security, and EnForce, an automated risk management platform, today announced their participation at (ISC)2 SecureDubai 2016 to be held November 22 at the Burjuman Arjaan by Rotana, Dubai.
Under the event theme of ‘Securing the Virtual Organization’, Guidance will lead a discussion on how organizations can manage the surface area of digital risk in a virtual world with forensic security.
Fortunato Guarino, Solution Consultant EMEA and Cybercrime & Data Protection Advisor at Guidance Software, who will be leading Guidance’s presentation at the event, said:
“Using aviation as an analogy, if airlines promised a 99% safety rate, we are looking at approximately 300,000 crashes a year! You wouldn’t tolerate the 1% failure rate with airlines, so why should you when it comes to the security of your organizations’ most critical assets? Building on the aviation analogy, Network Protection tools are like airport security, they are getting more advanced, but they aren’t perfect and threats still get through. And when they do, they aren’t easy to uncover. In fact, according to a Verizon Data Breach Investigation Report, 66% of breaches take months or even years to discover, highlighting acute visibility gaps in security defenses.”
Given the multi-dimensional world most organizations operate in, where data is stored in multiple geographic locations, and increasingly spread across varied cloud-based data stores and file-sharing systems, deploying forensic security solutions that give IT teams 360-degree visibility of all critical assets is paramount. Using three use cases, Guidance will highlight how their EnForce™ Risk Manager can help organizations proactively identify, categorize, and remediate private or sensitive data across the enterprise. The solution offers the deepest level of insight and control of electronic data across all endpoints, file shares, servers, and cloud repositories. This enables organizations to improve business intelligence, ensure compliance, and mitigate many types of risks.
“It is no longer a case of if a data breach will occur but rather a question of when. As such, it is imperative for organizations to go beyond just perimeter security solutions and deploy endpoint detection and response tools that identify forensic residue across every stage of the attack cycle and then triage and remediate the threats that will penetrate the network.”