Today at the Black Hat 2018 Conference, security solutions integrator Optiv Security today announced their new “EnemyPerspectives@Optiv” integrated services suite. These new services allow enterprises to evaluate their digital footprint from the perspective of a threat actor or hacker. EnemyPerspectives@Optiv thus enables enterprises to discover potential weaknesses in their network and remediate them. They can see the most likely attack vectors and work to prioritize them rather than attempt to protect everything simultaneously.
The EnemyPerspectives@Optiv Services works across three categories: Threat Actor Profiling (to help enterprises understand their enemies), Cyber Resiliency (to stop network downtime as the result of an attack), and Incident Response (for proactive defense).
In a statement, Chad Holmes—Chief Services and Operations at Optiv—said: “While transforming business to the latest apps and services provides access to new customers through more targeted data, it also creates a wider attack surface for threat actors to exploit, and puts businesses at greater reputational and financial risk. The assumption that plug-and-play security technologies can thwart threat actors is only one piece of the puzzle.”
“We need to turn things around – take a different perspective, the perspective of the attacker – in order to have a more complete view on the risks to our businesses. The attacker sees things differently. They have a different purpose. They may look at part of an enterprise’s IT stack and instead of seeing protection, they see potential. An organization needs the right technologies deployed in the right ways, but it also needs insight into where vulnerabilities exist, based on demonstrated threat actor intent and behavior.”
You can read more about the Optiv EnemyPerspectives@Optiv Services here.
Latest posts by Ben Canner (see all)
- How Do Privileged Identity Management Tools Work? - February 12, 2020
- Expert Commentary on Safer Internet Day for Businesses - February 11, 2020
- The Top Identity & Access Management (IAM) Books You Should Be Reading - February 11, 2020