Top 10 technologies for IT security

There's nary a retail organization not focused on IT security today thanks to recent high-profile data breaches. Gartner's list of top technologies can help narrow the focus when identifying risk and seeking solutions.

"Enterprises are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication," said Neil MacDonald, VP and Gartner Fellow. "Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the Nexus of Forces, which brings mobile, cloud, social and big data together to deliver new business opportunities."

The list of technologies is long and detailed, but so too are the number of threats to retailers. Among Gartner's top technologies are:

Cloud access to security brokers. These on-premises or cloud-based security policy enforcement points are placed between cloud services consumers and cloud services providers to interject enterprise security policies as the cloud-based resources are accessed. In many cases, initial adoption of cloud-based services has occurred outside the control of IT, and cloud access security brokers let businesses gain visibility and control as its users access cloud resources.

Adaptive access control. A form of context-aware access control that acts to balance the level of trust against risk at the moment of access using some combination of trust elevation and other dynamic risk mitigation techniques. Use of an adaptive access management architecture enables an enterprise to allow access from any device, anywhere, and allows for social ID access to a range of corporate assets with mixed risk profiles.

Pervasive sandboxing (content detonation) and IOC confirmation. "Once a potential incident has been detected, it needs to be confirmed by correlating indicators of compromise across different entities," stated the report. "For example, comparing what a network-based threat detection system sees in a sandboxed environment to what is being observed on actual endpoints in terms of processes, behaviors, registry entries and so on."

Endpoint detection and response solutions (EDR). An emerging market that can satisfy the need for continuous protection from advanced threats at endpoints (desktops, servers, tablets and laptops). Most notably, it significantly improves security monitoring, threat detection and incident response capabilities.

Big data security analytics at the heart of next-generation security platforms. Going forward, all effective security protection platforms will include domain-specific embedded analytics as a core capability. Gartner predicts that by 2020, 40 percent of enterprises will have established a "security data warehouse" for the storage of this monitoring data to support retrospective analysis. By storing and analyzing the data over time, and by incorporating context and including outside threat and community intelligence, patterns of "normal" can be established and data analytics can be used to identify when meaningful deviations from normal have occurred.

Machine readable threat intelligence including reputation services. These services provide real-time "trustability" ratings that can be critical differentiators and for retailers.    

"With the opportunities of the Nexus come risks," said MacDonald. "Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk management programs that simultaneously enable business opportunities and manage risk."

For more:
-See this Gartner study

Related stories:
How to prevent Target-like data breaches
EBay hit in cyberattack, 112 million user accounts compromised 
EMV migration won't save retail
Retailers unprepared for more breaches
Lowe's discloses breach of employee information