Health care firm recovers lost time with Intellitactics tool

One major health care provider found itself spending too much time addressing security-related problems, but a network security management tool from Intellitactics has enabled the company to look at dozens of events in the same amount of time it used to spend dealing with just one.


Now that security is a high priority for most companies, businesses are finding themselves overwhelmed with security-related data. However, one new tool can help an enterprise make sense of its reams of daily reports.

A director of information technology at a major health care provider, who requested anonymity, said that security-related

events are a drain on his staffing resources. He is often forced to allocate as many as 10 or 15 people to do nothing but look at logs until a problem is identified.

His company is now using Network Security Manager, a product from Intellitactics Inc., a Bethesda, Md., security vendor. Intellitactics is one of a number of companies, including NetForensics Inc., that provide security management tools. These tools help companies use existing security data more efficiently, said Mark Nicolett, research director with the Stamford, Conn., research firm, Gartner Inc.

"There is too much data; companies need something that can categorize the threats and prioritize them, evaluate the data to present the events that are the most critical," Nicolett said.

Intellitactics' product aggregates data from any security-related application that can generate a report. It also has a graphical user interface that helps security professionals better understand security events, said Paul Sop, CTO and cofounder of Intellitactics.

That user interface has been useful for the health care company. Its IT director said that with this system, he can click on an event and trace it back to its source. Instead of spending several hours tracking down a single event, he said, his employees can now look at dozens or even hundreds of events in the same amount of time.

The tool can also help identify intrusions from the inside that may not be as easy to identify with other tools. For example, if someone accesses certain files for the first time, or if someone from one department suddenly accesses files owned by another department, that activity can be noted, Sop said.

Deploying Network Security Manager is not simple. The IT director with the health care provider said that he divided his systems into two categories, the critical zone and the rest of the network. The critical phase of deployment took one month, the second phase, two months. Deployment also requires detailed knowledge of the network and the security tools already on the network.

Many companies from both the network-monitoring market, such as Computer Associates International Inc., as well as security vendors, such as Symantec and others, are developing products that provide similar aggregated views, Nicolett said.

FOR MORE INFORMATION:

Browse our best networking Web links on security

Pose your questions to our security expert, Luis Medina

Dig deeper on Network Monitoring

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close