Significance of Network Forensic Device to Enterprise Secured IT Environment

How to Effectively Control Internal Threats inside Enterprise
By: Decision Group Inc. Taiwan
 
TAIPEI, Taiwan - Aug. 29, 2014 - PRLog -- Internal threat is like cancer in the early stage. When it grows silently, nobody senses its existence. Once it has impact on health, it has been growing rampant inside body and even risked life. It is quite essential for IT security officer and auditor in enterprise to find out potential internal threats as early as possible.

In high tech industry, lots of companies suffered billions US dollars loss for the past 10 years just because few disgruntled employees carried core business confidential to competitors or opened new business to compete against ex-employers. There was more than 10 billion US dollar loss, according to market survey, by corporate internal threats worldwide in 2013, and, worst of it, most of cases are still going through long term lawsuit process for reparation now. What victim company loses is not only money, but it also loses business momentum in the market and credit to both partners and customers.

Why is it hard to detect internal threats inside enterprise IT environment? Most of enterprises are lacking efficient procedure and appropriate equipment to prevent it, though those enterprises invested lots in IT security enhancement every year against any kind of potential IT threats. On the other hand, the trend of “Bring Your Own Device” (BYOD) in corporate IT environment by cloud computing increases the risk of malice data leakage.

“We fully understand how serious about internal threats inside enterprise IT environment is,” said Casper Chang, CEO of Decision Group “because I and Decision Group also suffered such internal threat before. We have developed powerful weapon by network forensic technology against such risk, and also like to share our experience and technology to our customers.”

Nowadays, enterprise IT environment is getting more and more complicated because of versatile of business demands from market and multiple functions of internal organization. To this requirement, Decision Group offers full spectrum of network forensic solutions against potential internal threats at every corner of enterprise IT environment.

First for enterprise wireless and wired networks, we offer different network forensic devices to check the malice behavior. In wireless network, Decision Group Network Investigation Toolkit (NIT) can effectively combat all traffic through enterprise wireless network. You may verify whether there is any unknown access and intrusion from employee own mobile device or through spilled-over wave.

In enterprise wired network, there are lots of difficulties to collect all traffic extensively due to configuration of network segment and traffic volume; however, Decision Group network forensic solutions focus on 2 perspectives of IT security: internet link and intranet link. Most of internal threat instants are of data leakage through internet. So, how to detect whether there is any potential data leakage possibility among outbound messages to internet is very critical to enterprise. On the other hand, the risk of data leakage among outbound messages is much higher in those HTTPS protected messages. Decision Group provides E-Detective can effectively detect those potential data leakage instance in those outbound messages, whatever plain messages or HTTPS messages, notify IT security officer if suspicious messages are detected and keep suspicious messages as evidence.

Another point of internal threats is inside intranet. Those threats such as harassment, blackmail, cyber bully…etc., are very common in daily office life. How to maintain a secured office environment for all employees is very important. Decision Group provides Enterprise Data Guardian System (EDGS) to monitor all internal activities of enterprise emails, file transferring and data accessing…etc. Through deployment of EDGS, IT security can easily confirm those malice cyber activities in enterprise IT environment.

The above functions we mention are the data interception of Decision Group network forensic solution. Practically IT security officer cannot only check out each activity record of potential internal threats, but IT security officer can also use many powerful analytic tools, like bandwidth usage by person, service usage by person, link analysis…etc., provided by Decision Group solutions to find out what the fact and motive is behind these internal threats. Long term analysis on these intercepted records can also provide an insight on employee office behavior. This analytic report can be integrated into part of corporate IT auditing report.

For those enterprises with multiple office location, the deployment of Decision Group network forensic solution can be multi-tier with distributed frontend system in each branch office and centralized backend management (CMS) and data retention systems (DRMS) in enterprise data center. By this way, IT security officer and auditor can monitor all potential internal threats in the entire enterprise IT environment centrally. Besides, Decision Group network forensic solutions can be integrated easily with different corporate IT management systems, such as SIEM, IDS, DLP and NMS, to provide a seamless IT security web for any potential IT risk.

Over all, Decision Group has developed full spectrum of network forensic solutions for enterprise IT demand on effective internal threat prevention. All the products are based on the IT governance and IT risk mitigation for enterprise IT environment.

Please also check out our website: http://www.edecision4u.com for more product sales, technical and service information. Wherever you are, if you need more information about our products and services, please contact with decision@decision.com.tw. We’ll be glad to give you our utmost support service.

About Decision Group, Inc.

Decision Group is a company focused on worldwide renowned DPI application of E-Detective.  Decision Group, established in Taipei, Taiwan since 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition & Measurement Products and Industrial Automation and Control Systems.

Decision Group, in the year 2000, started a new line involved in designing and developing equipment and software for Internet Content Monitoring and Network Forensics Analysis Solutions. Now, Decision Group has positioned itself as a total-solution provider with a full-spectrum of products in its portfolio for network forensic and lawful interception.

Contact
Isabelle Huang
***@decision.com.tw
End
Source:Decision Group Inc. Taiwan
Email:***@decision.com.tw Email Verified
Tags:Lawful Interception, Network Forensics, Cybercrime Investigation
Industry:Internet, Security
Location:Taipei - Taipei - Taiwan
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Decision Group Inc. PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share