Resources

Analyst Reports
451 Research Report

"TaaSera has the same holistic view of malware as we do. And instead of choosing just one or two phases of the malware lifecycle, as many of the vendors covered in our report did, TaaSera aims to target malware through its entire lifecycle with real-time monitoring every step of the way."

Guides
Solutions Guide

The Facts are Startling: 

  • 93% of companies are already compromised; 
  • 69% of organizations are between “somewhat confident” and “highly doubtful” that they can detect an important security issue before it had a significant impact; 
  • The time between infection and data breach is shrinking while time to detect is increasing. 


The harsh reality of today’s breach defense is that our reliance on Defense in Depth (DiD) has driven us toward the endpoint and perimeter.  In theory, anything penetrating the perimeter will be caught by the endpoint and vice versa. But as the great baseball player and coach Yogi Berra once said: “in theory there is no difference between theory and practice. In practice there is.”  This is the state of our current breach defense. 

Learn how TaaSera solutions help organizations preempt data breaches while regaining speed, agility and clarity.

Risk-Based Security Buyer's Guide

Every day we read about new breaches. This is good and bad for information security professionals. Organizations are in a cyber arms race they cannot win: bolting on increasingly sophisticated products to defend against increasingly sophisticated threats. There are diminishing returns with this approach and this is particularly true for Small- to Medium-sized Enterprise (SME) organizations.

This Buyer's Guide explores what SMEs can do to shift from perimeter defense to a comprehensive and affordable incident response strategy.

Data Sheets
NetTrust Data Sheet

The harsh reality of today’s cyber war is that 9 out of 10 companies’ defenses are already compromised by exploits, malware and malicious insiders. Current security defenses are failing badly and it’s time for a new approach.

Case Studies
Ransomware Customer Success Story

Learn how a insurance company used TaaSera NetTrust to validate their systems were clean after a major ransomware attack.

Financial Services Customer Success Story

Learn how TaaSera allowed a client to contain, respond and preempt a financial services data breach.

Healthcare Customer Success Story

Learn how TaaSera allowed a client to contain, respond and preempt a healthcare data breach.

Videos
Attack in Depth Overview

Cybersecurity analysts make widespread use of the Kill Chain model to describe the stages of an advanced threat. This model is overly focused on intrusion, while the most damaging activities in fact occur after landed malware gets inside. Attackers Deliver a malicious payload, Evade detection at the perimeter, Persist on an endpoint and Take Hold across the network. TaaSera calls this model Attack in DEPTH.

TaaSera on the OPM Breach

The OPM Breach and TaaSera's Attack in Depth Model

What's Changed in Cybersecurity?

Howard Schmidt at RSA Conference 2015

White Papers
Data Analytics White Paper

Big data is all the rage in cybersecurity.

There's a general perception that throwing everything at a big data engine is the way to identify malicious behaviors. However, big data has two significant challenges: analytics tools are only as good as the data sources you provide, while analysis without context doesn't always recognize patterns or establish threat relevance for remediation.

Get the white paper to read about TaaSera's unique slant on "Cybersecurity Data Analytics: the Contextual Challenge."

Incident Response: The New Paradigm

Today’s IT systems have become increasingly vulnerable to advanced cybersecurity threats. As the number of systems that require monitoring and management expands, Incident Response systems are at risk of becoming overwhelmed by the sheer volume of attacks, events and alerts.

This paper examines the Incident Response system requirements that IT organizations facing these conditions need to consider in their planning and operations.

Webinars
How to Preempt a Data Breach

How should IT security professionals best implement new controls, technologies, and procedures to address the growing risk of data breach? The answer is simple: network compromise must be assumed and preemptive breach detection and response must be implemented. Preemptive breach detection focuses on the dangerous activities occurring after initial intrusion and infection.

David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Ivan Shefrin, vice president of security solutions at TaaSera, join for a discussion about using preemptive breach detection systems that continuously identify post-infection, pre-breach behaviors early enough to contain and respond to pending data breaches.

Demo

Join the TaaSera security team as we discuss and demonstrate how to detect and respond to systems at risk of breach.

Schedule a Live Demo

Learn how NetTrust visualizes patterns of behavior across the entire lifecycle of a coordinated, multi-stage attack.

TaaSera Blog

Cybersecurity for Critical Infrastructure

Cyber threats and vulnerabilities pose likely and imminent degrees of risk to the critical infrastructure grid which includes facilities, supervisory control and data acquisition systems (SCADA) and field devices. The intricate network architecture of the smart grid is exposed to hidden risks posed by interconnected heterogeneous devices from multiple vendors, integrated open source and commercial off-the-shelf (COTS) components, and minimum (or lack of) supply chain cyber hygiene.

Read More

Cyber Security for Healthcare

The healthcare industry is undergoing a radical reform from HIPAA to HITECH with the passage of legislation to (a) impose civil and criminal penalties on willful neglect, and (b) adoption of Electronic Health Records (EHI) with implications on security of electronic Protected Health Information (ePHI) across the supply chain including providers and business associates. These two key provisions will drive how CIOs and CISOs in the healthcare industry must develop processes and policies for compliance and enforcement.

Read More

The Power of Observation

The move from “log correlation” to “behavioral risk” requires a paradigm shift.

The first generation of cybersecurity solutions leveraged the power of “logs”. This was based on the credence that ad-hoc events once captured and preserved may be correlated in the future to provide historical evidence. Logs are valuable for technical support, troubleshooting and audits. The log centric model was designed to fulfill compliance requirements and verify security controls implemented for access management.

Read More

Events

There are no events currently listed. Please check back soon.

Webinars

How to Preempt a Data Breach

How should IT security professionals best implement new controls, technologies, and procedures to address the growing risk of data breach? The answer is simple: network compromise must be assumed and preemptive breach detection and response must be implemented. Preemptive breach detection focuses on the dangerous activities occurring after initial intrusion and infection.

David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Ivan Shefrin, vice president of security solutions at TaaSera, join for a discussion about using preemptive breach detection systems that continuously identify post-infection, pre-breach behaviors early enough to contain and respond to pending data breaches.

Demo

TaaSera Demo See how TaaSera finds hidden behaviors before the breach

TaaSera Live

Learn

Learn How Learn how to prevent a data breach using the NetTrust Preemptive BDS.

Learn How

Try

Try NetTrust Evaluate NetTrust in your live environment.

Get Started