Media Contact:
Kathy Bentaieb
AccelOps
408-510-5056
[email protected]
AccelOps Named Security Leader in SANS Top 20 Critical Security Controls
AccelOps listed as solution provider in Maintenance, Monitoring and Analysis of Audit Logs
SANTA CLARA, Calif. – Oct. 16, 2014 – AccelOps, the leading IT operations analytics platform for the modern data center, has been listed as a security leader in the SANS Top 20 Critical Security Controls for 2014. In fact, AccelOps addresses 17 of the Top 20 Critical Security Controls.
The SANS Institute is the largest cooperative research and education organization for information security training, certification and research. The SANS Top 20 Critical Security Controls, now in its fifth version, lists essential security controls that help define and guide strategies and solutions for effective cyber-defense. It is a valuable checklist that security and IT managers use to evaluate how systems and strategies address major threats and vulnerabilities.
The Critical Security Controls focuses first on prioritizing security functions that are effective against the latest advanced targeted threats, with a strong emphasis on “what works” – security controls where products, processes, architectures and services are in use that have demonstrated real-world effectiveness.
SANS explains the Controls were derived from the most common attack patterns and were vetted across a very broad community of government and industry leaders. Inclusion on the list is validation that the vendor delivers a high level of security control.
SANS named AccelOps a SIEM solution provider for Security Control #14, Maintenance, Monitoring and Analysis of Audit Logs. This is a critical control because without collecting, managing and analyzing audit logs, cyber attackers can hide their location and undetectably steal data and disrupt an entire network infrastructure.
Flawed security logging or analysis allow attackers to hide their activities, often for weeks or even months. Even when systems are known to have been compromised, a lack of comprehensive logging records often works to obscure the details of the attack and hide subsequent actions taken by the attackers. As a result, response to fix the breach is often too late to prevent the damage.
AccelOps automates the log analysis processes of all network servers and equipment with a continual audit of the environment. Anomalies are immediately flagged for security review. The system also includes advanced log analytic tools that allow for log aggregation and consolidation from multiple machines. Security administrators can more effectively focus on unusual activity, avoid false positives and more rapidly react to threats and anomalies.
AccelOps ensures that organizations never miss events buried in audit logs that could help detect, understand or recover from an attack. Using AccelOps’ world-class discovery and real-time correlation to enrich log data with real-time context leads to quicker problem resolution.
As recent high-profile cyber breaches demonstrate, even organizations with advanced security systems and adequate staffing find it difficult, if not impossible, to effectively fend off cyber-criminals. Processes are needed to control the discovery and management of security threats.
“The SANS Critical Security Controls is a valuable guide to ensuring that organizations’ IT systems are prepared for major threats and vulnerabilities,” said Flint Brenton, AccelOps president and CEO. “We are honored to be recognized by SANS for our analytics-driven security platform.”
AccelOps recently published a whitepaper, “Defend Your Organization from Cyber-Thieves: Don’t Be the Next Target,” which details how its automated discovery-driven approach addresses 17 of the SANS Top 20 Security Controls to serve as a counterattack to cyber-threats.
AccelOps is also participating in the SANS Network Security 2014 Expo on Oct. 22 in Las Vegas.
More details are in the SANS Critical Security Controls poster for fall 2014.
About SANS
The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 27 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master’s degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community, including consensus projects, research reports, and newsletters; it also operates the Internet’s early warning system-the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org)
About AccelOps
AccelOps provides the leading IT operations analytics platform for the modern data center. The virtual appliance software monitors security, performance and compliance in cloud and virtualized infrastructures – all from a single screen. AccelOps automatically discovers, analyzes and automates IT issues in machine and big data across organizations’ data centers and cloud resources, spanning servers, storage, networks, security, applications and users. AccelOps’ patented analytics engine with cross-correlation and statistical anomaly detection sends real-time alerts when deviations occur that indicate a security or performance-impacting event. The AccelOps platform scales seamlessly and provides unmatched delivery of proactive security and operational intelligence, allowing organizations to be more responsive and competitive as they expand their IT capabilities. For details, visit www.accelops.com.
AccelOps and the AccelOps logo are trademarks of AccelOps, Inc., a privately held Delaware corporation. Other names mentioned may be trademarks and properties of their respective owners.