Advertisement
Singapore markets closed
  • Straits Times Index

    3,224.01
    -27.70 (-0.85%)
     
  • S&P 500

    5,251.07
    +2.58 (+0.05%)
     
  • Dow

    39,743.86
    -16.22 (-0.04%)
     
  • Nasdaq

    16,391.47
    -8.05 (-0.05%)
     
  • Bitcoin USD

    71,042.54
    +1,407.09 (+2.02%)
     
  • CMC Crypto 200

    885.54
    0.00 (0.00%)
     
  • FTSE 100

    7,961.87
    +29.89 (+0.38%)
     
  • Gold

    2,226.20
    +13.50 (+0.61%)
     
  • Crude Oil

    82.31
    +0.96 (+1.18%)
     
  • 10-Yr Bond

    4.1980
    +0.0020 (+0.05%)
     
  • Nikkei

    40,168.07
    -594.66 (-1.46%)
     
  • Hang Seng

    16,541.42
    +148.58 (+0.91%)
     
  • FTSE Bursa Malaysia

    1,530.60
    -7.82 (-0.51%)
     
  • Jakarta Composite Index

    7,288.81
    -21.28 (-0.29%)
     
  • PSE Index

    6,903.53
    +5.36 (+0.08%)
     

Top Five Hottest Trends at RSA 2016 Conference

Netwrix Sums Up Key Takeaways From the Premier IT Industry Event That Will Determine the Development of the Tech Sector for the Next Year

IRVINE, CA--(Marketwired - Mar 10, 2016) - The 25th 2016 RSA Conference, held in San Francisco, CA, has brought together the record number of attendees from all over the world to discuss major IT industry trends and upcoming challenges. For the past years, RSA Conference has been raising different hot topics, from unstructured data governance, IT auditing and network monitoring to threat detection and new cost-effective approaches to infrastructure management. This year the RSA Conference continued to provide an exclusive look at common security concerns, demonstrating more clearly than ever that the most pressing problems remain nearly unchanged over the years, while the methods that address these issues are rapidly evolving.

Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, summarizes the most interesting highlights from the RSA 2016 and identifies five buzzwords that will matter most to the IT community in the following year:

Threat. Each vendor has its own vision of what cyber security threat actually is. As a result, the related taglines of the conference varied from "threat defense" and "threat protection" to "threat response" and "threat intelligence." While organizations try to identify which threats pose the greatest risks, vendors are ready to provide various solutions.

Visibility. Although vendors offer different technologies that somehow provide visibility into hidden processes that occur across the IT environment, such as network monitoring and vulnerability assessment, we suggest the unified meaning of visibility is an ability to provide comprehensive picture of who is doing what, where and when, and who is able to access what files across all critical systems and applications. Despite being a relatively new trend, it has a huge potential to become a synonym to IT security and inevitable part of organizations' workflows.

ADVERTISEMENT

Security analytics. Apart from visibility across the network, it is extremely important to have technologies in place that allow to process large scale of data, as well as conduct thorough root cause and predictive analysis to develop an effective mechanism for decision-making. Many vendors increase effectiveness of their security analytics tools by adding real-time behavior analytics that help gain deeper insight into what is going on in the IT infrastructure and minimize the risk of insider-caused data breaches.

Machine learning. The overall excitement surrounding Big Data is gradually fading. Indeed, customers begin to realize that leveraging Big Data is hard without new cross-disciplinary approaches to cybersecurity. Machine learning is already becoming one of the core technologies to distill voluminous data into actionable intelligence and solve advanced security problems, such as identifying infected machines on the corporate network. Artificial intelligence can empower IT professionals in the fight against sophisticated adversaries by discovering patterns that can be used to compromise security and taking targeted defensive actions.

Privacy. The Apple/FBI controversy raised one of the most debated issues during the event: the possibility of balancing security and privacy, and whether government intrusion is justified when it comes to extreme circumstances. In this context most of the professionals agreed that encryption is a key to providing end-to-end data protection, and weakening it for convenience of law enforcement would mean that culprits can also take advantage of it.

"While in 1991 the hottest topics at the RSA conference were cryptography and adherence to industry regulations, this year the discussion covered much broader range of issues due to rapid development of IT technology and evolution of cybercrime," said Michael Fimin, CEO and co-founder of Netwrix. "This year most of tech industry's developments were discussed in a context of cybersecurity, privacy and risk mitigation. In the light of recent headline-making data breaches organizations more than ever have to adopt a comprehensive strategy that combines protective mechanisms with high-level analytics, threat intelligence and visibility to reduce overall vulnerability and ensure integrity of critical assets."

About Netwrix Corporation

Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest-growing companies in the U.S.

For more information, visit www.netwrix.com