Strategic ICT Partner
Technology Partners
Powe r i n g I T a h e a d
60 Mins Show dates: 14-18 October 2012, Dubai World Trade Centre
FOLLOW US
@computernewsme
| AT GITEX TECHNOLOGY WEEK | Exhibition hours: 11am -7pm
Access Data to unveil new release of CERT
Jason Mical, Director of Network Forensics, Access Data Security company Access Data will tomorrow launch version 2 of its CERT (Cyber Intelligence and Response Technology) product, which is the only solution to put cyber defence, incident response and digital forensics into a single pane of glass. The Middle East has seen a large increase in demand for effective security solutions as organisations attempt to avoid the same fate as those that have suffered major
breaches, like the devastating ‘Shamoon’ malware attack of Saudi Aramco earlier this year. “We do something that is very different to any other vendor people see at GITEX. There are a lot of niche players out there. Some of them do network-based forensics data-inmotion, some of them do host-based forensics and some of them do malware analysis. CERT has taken all of those technologies and processes
and put them into one single pane of glass,” said Jason Mical, Director of Network Forensics, Access Data. “So we can see data that is moving and resting, all kinds of forensics, search and review and malware analysis, unlike any other vendor can. There are companies that do little pieces of them, but we’re the only one that can show it all in one dashboard,” he added. According to Mical, the most important factor in organisations protecting themselves for attacks is timing. “These attacks are hitting and the longer you let them go, the more damage that’s getting done. So having the capability to have full visibility of data without having to take the box offline and do an analysis, logs and traditional incident response is vital. We can get on the box in any location around the world from right here and do full forensic analysis, memory analysis and network analysis in a matter of seconds, and then be able to remediate it as well. So if we’re finding rogue processes or malicious content, we can immediately hit a 4 CONTINUED ON PAGE 3
14 -16 MAY 2013, QATAR
PICTURE OF THE HOUR