Welcome!

News Feed Item

AccessData Introduces InSight Platform(TM), a Next-Generation Threat Intelligence and Incident Response Solution in Singapore



Industry's first continuous and automated incident resolution platform for faster detection, analysis and response to cyber-attacks

Singapore, May 2, 2014 - (ACN Newswire) - AccessData, the leader in incident resolution solutions, recently announced the market launch of InSight Platform(TM), an advanced cybersecurity solution enabling enterprises to adeptly eradicate and resolve the rapidly accelerating volume of cyber-attacks and data incidents. In recent years, AccessData has made enormous investment in Singapore, planting its largest international forensic lab in the island state, and acquiring a rich customer portfolio covering a gamut of government law enforcement agencies, financial services companies and technology companies.

With the growth in advanced persistent threats and cyberattacks, most recently with the Heartbleed vulnerability and major US and UK retailer breaches, enterprises fail to rapidly understand and respond to the hundreds of daily threat alerts across their networks, endpoints and devices. Chief Information Security Officers (CISOs) and security experts lack the integrated solutions, threat intelligence and context to quickly prioritize and expedite resolution of incidents. Watch (http://bit.ly/1mkrv5c) the video interview with Jason Mical, Vice President, Cyber Security Services, in which he talks at length about the security challenges face by various business entities and government agencies, and how they can weaponise their threat intelligence.

The intuitive InSight Platform enables the entire incident detection, analysis and resolution lifecycle in a single, consolidated platform with the ability to automate every step. As threats are identified, endpoint and network forensics information, contextual data, and analysis results are automatically obtained, digested and presented in a unified view for immediate analysis. Delivering on AccessData's vision of Continuous Automated Incident Resolution (CAIR(TM)), the InSight Platform has one common code base that consolidates existing market-leading cybersecurity, forensics and e-Discovery products and leverages their combined capabilities to identify and resolve every data incident or data request as efficiently and accurately as possible.

"The traditional incident response infrastructure is a fragmented patchwork of network, endpoint and Security Information and Event Management (SIEM) tools, which do not interoperate well," said Golan Ben-Oni, CSO and SVP Network Architecture, IDT Telecom. "Security demands real-time, automated response. Integrating my SIEM with AccessData's InSight Platform has reduced our response times from 12 hours to 2.5 hours. That's an 80% reduction in response time[1]."

"The reality of today's cybersecurity world is one of continuous compromise, where every network has unauthorized people doing unknown things at any given time," said Jason Mical, Vice President, Cyber Security Services, AccessData. "In an environment of consistent cyber-attacks, the ability to continuously detect, quarantine, respond to and resolve such incidents is an absolute must-have for any business or government entity. With the massive growth and diversity of information, the need to automate as much of the incident resolution process as possible is obvious. We look forward to delivering enormously beneficial response time reductions, like those experienced by IDT, to enterprises and government entities across the globe."

The InSight Platform is the market's first incident resolution solution, working seamlessly with legacy investments to give CISOs and IT departments comprehensive, real-time visibility into threats and incidents and the ability to remediate and resolve them quickly and easily.

See photos of InSight Platform(TM) launch in Singapore on Flickr. http://bit.ly/1lG0k24

Additional Resources

InSight Platform overview: http://bit.ly/1pVu6Ep
InSight Platform brochure: http://bit.ly/1iQ5Oqw
InSight Platform data sheet: http://bit.ly/1hjvszo
Video: InSight Platform for Faster Incident Response http://bit.ly/1ucgNyX
Blog: Introducing AccessData InSight Platform: Enterprise Intelligence across the Organization http://bit.ly/PWhSdN
Blog: InSight Platform Accelerates the Speed of Incident Resolution http://bit.ly/1n9BNSU
Case Study: IDT Corporation Reduces Response Times By 80% http://bit.ly/1rVFhum
Ponemon Study on Threat Intelligence and Incident Response report http://bit.ly/1iWccdV

Follow us on Twitter @AccessDataGroup, @AccessData_SGP.

About AccessData

AccessData Group makes the world's most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today's environment of continuous compromise. http://accessdata.com.

1. Source: IDT Telecom, February 2014

Media Contact:
EASTWEST PR for AccessData
Melinda Ilagan / Grace Yu
[email protected]
Tel +65 6222 0306

Source: AccessData

Copyright 2014 ACN Newswire. All rights reserved.

More Stories By ACN Newswire

Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...