Blog | G5 Cyber Security

Malware? Cyber-crime? Call the ICOPs!

Enterprise cybersecurity infrastructure is made up of an army of independent point tools that require individual administration and deliver discrete reporting and security telemetry. ICOPs consume telemetry from detection and forensics tools from vendors like Bit9 + Carbon Black, FireEye, Hexis Cyber Products, and Palo Alto Networks as well as threat intelligence from firms like iSight Partners, Norse, Symantec, and Webroot. 48% of security professionals say that their organization plans to build an integrated cybersecurity infrastructure featuring central command-and-control (i.e. policy management, configuration management, security analytics, etc.)”]

Source: https://www.csoonline.com/article/2938854/malware-cyber-crime-call-the-icops.html

Exit mobile version