Q&A: Webroot’s Kennedy explains how SMBs can benefit from threat intelligence

By Byron V. Acohido

Threat Intelligence has been a hot topic at RSA, Black Hat and other conferences of late. ThirdCertainty asked Patrick Kennedy, Webroot’s vice president of enterprise marketing, to supply some context.

LastWatchdog: Let’s say I’m a growing company with 50 – 1,000 employees? What do I need to understand about threat intelligence?

Kennedy: Threat Intelligence can take two general forms, consulting and advise, or actual operational threat intelligence. For a smaller business, operational threat intelligence is probably more relevant. For example, a small business could take steps to monitor and block IP addresses known to be the source of malware.

LW: What are the main concerns?

Kennedy: Small businesses do not want to risk their customer data or intellectual property, and need to recognize that general Internet usage can pose a serious threat to their networks. They also need to look at how they can remain compliant with privacy regulations. Threat intelligence can help businesses predict which other malicious IPs, URLs, files and applications are likely to attack their business in the future. This enables them to setup their perimeter and layered security solutions accordingly to monitor, catch and foil future attacks.

LW: How much traction has this gotten in large corporation vs. smaller companies?

Kennedy: Enterprises continue to bolster their defenses and work to keep up with the myriad of threats facing them. SMBs are having a more difficult time staying ahead of these types of threats, especially if they are targeted at them. Cyber criminals recognize that, while the prize might not be as large, it may be easier to infiltrate SMBs.

All companies, whether enterprise or SMBs – especially those dealing with proprietary information or customer data – must balance their security resources against their risk tolerance, and look at threat intelligence solutions that provide them with the greatest scope of protection.

More on emerging best practices

Encryption rules ease retailers’ burden

Tracking privileged accounts can thwart hackers

Impenetrable encryption locks down Internet of Things

This article originally appeared on ThirdCertainty.com

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someone