… harnessing the power of artificial intelligence (AI),” he said. “Those potential threats could be to employees, customers or the businesses themselves.”
Intersections sees a real opportunity to have channel partners participate in its distribution of Identity Guard with Watson, Kessel said.
“Our experience in data breaches has shown us that smaller companies that do not have a dedicated IT staff are unprepared for a data breach and have been without a solution up until now,” he said. “They often don’t know if their data has been breached or what steps to take to minimize the possibility of a breach. We recently completed an agreement with a respected national solutions provider in a specialized vertical market to make this solution available to their clients and hope to engage other partners.”
Partners can think of Identity Guard with Watson as a “powerful early warning system whose state-of-the-art AI capabilities continuously scour billions of data points to discover vulnerabilities and alert individuals when their identity may be at risk,” Kessel said.
Deceptive Networks Increasingly Part of Managed Detection and Response
The global deception-technology market is expected to exceed $2 billion by 2021, accelerating at a compound annual growth rate (CAGR) of 15 percent, according to a report by Market Research Engine. Deception technology can discover, analyze and defend against zero-day and progressive attacks, often in actual time.
Alton Kizziah, vice president of global managed services at Kudelski Security, tells us that within the channel, the opportunities to leverage deception technology can be multifaceted. Kudelski offers deception networks as part of its managed security services (MSS), and managed detection and response (MDR) offerings.
“Certainly, the channel can help clients solve tough problems by reselling deception to their clients,” he said. “Those channel providers and VARs who can really make a difference can use deception technology a couple of ways. They can provide managed services around the technology to give their clients peace of mind [around the clock] and the channel can provide professional services around the technology, including integrations, forensics and incident response.”
Deception systems deceive the intruder who is attempting to command and control, or other attacks on the endpoint, Kizziah said. With deceptions deployed throughout an environment, an attacker must get every step of their “kill chain” correct, and the analyst only needs one alert anywhere in the chain of events, he said.
“You don’t hear much about the successful defense of a cyberattack, only the failures,” he said. “As deception is adopted more broadly, I think companies will have a capability to detect stealthy movements [more quickly] and have a better understanding of the attack methodology. Word of mouth at conferences and peer groups will be one of the ways that the deception market will grow. I also believe that there are many research firms currently looking at deception and the marketplace. These factors combined will most likely lead to …