Blog Excerpt: My grandmother – security intelligence pioneer
Posted by Heather Howland in Security Intelligence
Recently, Michael Applebaum, Director of Product Marketing at Q1 Labs, was interviewed for a post on Security Intelligence by Wes Simonds, a writer for the IBM Software blog. As you can imagine, in a company as large as IBM (offering thousands of solutions to a whole variety of business challenges), we encounter a lot of people who want to know more about the concept of Security Intelligence and have a lot of questions about exactly what it is we do here at Q1 Labs!
With that in mind, I’d like to share an excerpt from this short post that I think you’ll find fairly entertaining. After all, it’s not everyday that we get to hear about a grandma in an article about next-generation SIEM architectures.
Quite a few of today’s organizations could learn a little something about security from my grandmother — a thoughtful, yet paranoid creature who maintained a watchful vigilance over her home. I recall once she was going to Europe for two weeks. So, anticipating hordes of burglars, she developed an advanced domestic security architecture:
1. Data must be continually collected from many sources and analyzed for relevance, using proven heuristics
2. Point solutions like firewalls, though useful, are far from adequate by themselves
3. Proactive measures should be taken to address potential security gaps
4. Assets should be protected in proportion to their business value
5. Strategies spanning multiple domains should be pursued to maximize holistic security
6. Centralized oversight of those strategies will simplify and accelerate management
I believe quite a few IT security concepts can be extrapolated from this ad hoc architecture. Let’s go down that list and rephrase things a bit…
Perhaps this article can help you explain security intelligence and next-generation SIEM to your business and IT operations colleagues. Click here to read the full article. For more information on Security Intelligence, download our white paper, “The IT Executive Guide to Security Intelligence.”