EMA Top 3 Report and Decision Guide for Security Analytics
Security Analytics Benefits and Critical Use Cases for 2019 Planning
This Enterprise Management Associates (EMA) report identifies the leading priorities organizations face with resolving challenges and meeting enterprise security requirements given the nature and scope of attacks we face today. The intent of this report is to inform and inspire security professionals in their project planning and decision-making process by identifying and recognizing the most innovative vendor solutions that address the greatest business and security priorities.
In this paper, you will learn more about these critical security use cases:
- Detecting Lateral Movement
- Identifying Credential Abuse
- Threat Hunting with Mitigation/Containment
Lateral movement detection can result in high numbers of false positives and negatives. Awake Security deals with this challenge by tracking behaviors and attributing those to the entities rather than ephemeral characteristics, like IP addresses. It then presents this information in a forensic timeline for the entity and uses machine learning algorithms, like belief propagation, to score the risk for each entity.
David MonahanResearch Director, Security & Risk Management, EMA
Dig Deeper with These Resources
Awake Security 2 Minute Explainer Video
What if security could think? What if it could sense danger, calculate risk, and react quickly based…
Real World Incidents Detected and Stopped by Awake
Organizations across industries use Awake every day to identify and stop modern threats from both internal and…