pwshub.com

Enterprise security: Tackling threats with Dell and Intel - SiliconANGLE

One of the basic problems confronting enterprise security is that malicious actors have more attack techniques available than defenders have detections for them.

This reality was confirmed earlier this year when a security industry report found that enterprise security information and event management tools or SIEMs had detections for only 38 out of over 200 MITRE-identified attack techniques.

Rick Echevarria, VP of security sales at Intel, and JR Balaji, director of product management, security and manageability, of the Client Solutions Group at Dell Technologies, talk with theCUBE about enterprise security during Fal.Con 2024.

Intel’s Rick Echevarria and Dell’s JR Balaji spoke with theCUBE about enterprise security.

“I always tell people, look at the MITRE attack framework,” said JR Balaji (pictured, right), director of product management, security and manageability, of the Client Solutions Group at Dell Technologies Inc. “They’re constantly adding new techniques and that’s what customers are up against. Organizations have to think about security a lot more holistically than they ever did, which means not just focusing on software defenses that they’re all used to, not looking at a ‘moat and castle’ approach, but really looking at the entire PC ecosystem and stack.”

Balaji spoke with theCUBE Research’s Dave Vellante and Rebecca Knight at Fal.Con, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. He was joined by Rick Echevarria (left), vice president of security sales at Intel Corp., as they discussed how Dell and Intel’s collaborative security work with CrowdStrike addresses current and emerging vulnerabilities in the compute stack. (* Disclosure below.)

Implementing enterprise security in depth

Being able to look at security throughout the stack is becoming more significant as the attack surface for many organizations has expanded. Wider adoption of artificial intelligence and growing device complexity have made a broader security approach paramount.

“I think people don’t understand the complexity of a device and how creative attackers are to find any possible gap that you have left,” Echevarria said. “The approach that we take, in collaboration with Dell and CrowdStrike, is security in depth and we do it by design. You have to look at all aspects and you have to realize there’s so many layers within the stack, if you leave a gap, they’re going to find it.”

The work between Dell, Intel and CrowdStrike is designed to stay a step ahead of adversaries while keeping up with emerging threats. One threat on the security horizon involves fileless malware, code that employs legitimate tools built into a system to execute a cyberattack.

“Fileless attacks were just starting to emerge, and you don’t want it to become mainstream, highly exploited by adversaries before you start acting on them,” Balaji explained. “We are always looking at how an adversary operates. We do threat modeling, we look at how some of these ecosystems within the PC design can be exploited, such as supply chain.”

Here’s the complete video interview, part of SiliconANGLE’s and theCUBE Research’s coverage of Fal.Con:

(* Disclosure: Dell Technologies Inc. and Intel Corp. sponsored this segment of theCUBE.)

Photo: SiliconANGLE

Source: siliconangle.com

Related stories
1 month ago - Coming into 2024, the enterprise technology space buzzed with speculation on the future following VMware LLC’s acquisition by Broadcom Inc. Analysts and experts mused on how Broadcom would handle the portfolio direction for VMware’s many...
3 weeks ago - Trusted AI remains a focal point for enterprise leaders as they seek to drive innovation and operational efficiency. A recent study, commissioned by Teradata Corp. and NewtonX Inc., explored AI’s evolving role in modern business...
1 month ago - Enterprise security is undergoing a transformative shift as AI and large language models redefine the boundaries of threat detection and prevention. With traditional AI and machine learning approaches hitting their limits, the integration...
1 week ago - Israeli enterprise security startup Prime Security today launched and announced that it has raised $6 million in funding to accelerate research and development and expand its sales and engineering teams across its Tel Aviv and New York...
2 weeks ago - Detect. Respond. Recover. Those three actions capture the three-pronged security methodology for how Dell Technologies Inc. helps customers reduce the attack surface inside the IT environment. Yet there is a fourth action that also plays...
Other stories
36 minutes ago - GQG had decided to sell up by July, having told BBVA's management team that it believed the Sabadell bid would be too time consuming and distracting, while also diluting its exposure to emerging markets, the FT report said. Neither GQG,...
36 minutes ago - (Bloomberg) -- Asia’s stock markets are gearing up for their busiest week of listings in more than two years, offering a crucial test of demand as companies rush to raise money before the US election.Most Read from BloombergA Broken Oil...
1 hour ago - SoFi Technologies (NASDAQ: SOFI) is on a roll. The stock recently soared to $10 per share, its highest price since early 2022. It's progress, but...
2 hours ago - A turnaround plan is in place and now it has more money to make the plan a reality.
3 hours ago - Warren Buffett hasn't seen a lot to like in the stock market lately.The Oracle of Omaha has sold more stocks than he bought in each of the last...