Protect clients’ data from cyber-attacks by providing rapid, affordable threat detection.
The fast spread of the WannaCry ransomware in 2017 was a reminder of the cybersecurity threats organizations face.
Hospitals and manufacturers were among the many victims of WannaCry, which bypassed corporate security by exploiting a software vulnerability
London-based managed security services provider ITC Secure Networking understands these threats well. Since 1999, the company has helped many organizations protect their critical data. The challenge for ITC was to recognize vulnerabilities and identify threats as quickly as possible. ITC recognized that the best way to protect clients’ data and systems was to collect and analyze logs from firewalls, intrusion prevention systems, security applications, and other systems and devices.
This process could be very time consuming for some organizations. “I heard of one IT manager who had to look at the logs on the train to work, then on the way home,” says ITC’s Chief Technology Officer, Kevin Whelan.
One solution is to automate this task by using a security information and event management (SIEM) tool. This automatically analyzes the logs, using predefined rules to look for signs of suspicious activity. But not all companies can afford to purchase such a tool or hire staff members with the right skillset to operate it.
Unless organizations address this problem, they are at risk of being targeted by cyber threats. Whelan points out that hacker groups’ publication of hacking tools, including a tool used to spread WannaCry, has provided attackers with more ways to infiltrate systems.
“As people start writing exploits, it will be essential to react quickly,” Whelan says.
ITC’s customers have much to lose if their systems are breached. One financial organization manages transactions each day totaling many trillions of dollars. Other customers include some of the world’s largest manufacturers, which need to protect valuable intellectual property. In other cases, ITC protects the integrity and availability of websites and systems that process online transactions.