Trends Report

Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

Multiple Technologies Are Required For Breach Detection

July 24th, 2014
Rick Holland, null
Rick Holland
With contributors:
Stephanie Balaouras , Andrew Hewitt , Katherine Williamson

Summary

In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and risk (S&R) leaders are ready to turn their focus to the technologies for prevention as well as detection and response. S&R leaders frequently struggle with deploying the right mix of technologies to detect and respond to attacks. In this report, we discuss the four technologies that should form the pillars of your breach detection capabilities: malware analysis, network analysis and visibility, endpoint visibility and control, and security analytics. For each technology, we provide you with key evaluation criteria, considerations, and both commercial and open source solutions to help you select the right solution. These technologies, in the hands of skilled staff, are essential for building resiliency into your cybersecurity program.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.