Click Security adds new Senior Vice President of Sales

 

Company Positions for Sales Expansion in Big Data Security Analytics

 

Lawhorne_PrestonFAUSTIN, TX – July 14, 2014Click Security, a leader in advanced threat detection, today announced Preston Lawhorne has joined as its Senior Vice President of Sales.

“We are excited to have Preston join the Click Security team,” said Marc Willebeek-LeMair, CEO and co-founder.  “He is a seasoned security sales veteran with a strong track record of ramping early stage security businesses to high revenue growth.  With our recent product improvements around expanded analytics, scalability and ease of use – as well as the growing market acceptance that big data security analytics is an important movement – we are poised for strong sales growth, and Preston can help us tremendously.”

Lawhorne is a 40 year tech veteran with experience in building sales strategy and successfully executing go to market plans. Building some of the industry’s most successful “high octane” security sales teams, he has held key leadership roles in businesses including Burroughs/Unisys, Data General/EMC, Oracle, McAfee – and security startups including TippingPoint and LogRhythm.

“I’ve been a part of several important waves in enterprise network security over the years.  There is another wave in front of us as organizations realize spending on traditional prevention technologies alone is not stopping today’s adversaries and their methods”, said Mr. Lawhorne. “I’m excited to be part of Click Security because I believe their solution fills a gap left by today’s traditional security products – and can fundamentally change how we automate the early detection, analysis, and continuous monitoring of advanced threats.”

 

About Click Security

Click Security’s Click Commander runs real-time stream processing analytics against pre-computed log, network, and file/artifact data sources; automatically produces analyst start points with automated actor/event / relationship views; and provides a full attack activity framework – where analysts can interactively visualize, prune, and augment big security data.  Now analysts can gain true security visibility, automatically build rich context around otherwise independent and inconclusive product alerts, detect attack activity missed by traditional security products, and automate the hunt for the unknown.  Please visit us at www.clicksecurity.com for more information or follow us @clicksecurity.

Analyze This.

Analyze This: Big Data Security Analysis Made Easy

Really like John Oltsik’s latest article in Network World — trying to get CISOs to rethink what data to capture and analyze — Big data security analytics mantra: Collect and analyze everything.

“we no longer want (SIEM) technologies mandating what types of data we can and cannot collect and analyze. We used to be limited by analytics platforms and the cost of storage, but this is no longer the case. Big data, cheap storage, and cloud-based storage services have altered the rules of the games from an analytics and economics perspective. The new mantra for security analytics should be, ‘collect and analyze everything.’”

But, in talking with lots of customers, it seems like if you get much below the Fortune 50, the perception is that big data security analysis sounds like a scary complex proposition.

Let’s first agree that “big data” is a highly subjective term.  We can spend days on that one.  So let’s move on.  Don’t get hung up on volume.  It’s more about extracting relevant intelligence in a timely fashion.

Well, what if it was as simple as De Niro (forgive me, I’m a big fan) makes it seem?

At Click Security, we give you an easier path.  With us, you can gain visibility into the adversary activity in your network with as little effort as dropping a single DMU ISO onto a network tap port.  No other data feed configuration necessary.  As you get comfortable, add IPS/IDS data. Then add Windows authentication data.  Then add web proxy data.  The more data, the more we can show you.  But the point is — get started, see fast value, and grow from there.

Take a look at our latest explainer video to learn a bit more.

Or if you’re ready to give it a go, sign up to try Click Commander — no obligation at all.

The ISE® Central Executive Forum and Awards 2014

Congratulations to all the nominees and winners of the
The ISE® Central Awards 2014!

Central Executive Forum & Sponsor Pavilion | June 11, 2014 | DallasPhoto by Momenta Creative

Enterprise Data Security Overload

Kelly Jackson Higgins over at Dark Readings has a great post, “A State of Security Event Overload”. It discusses how the  overload of enterprise data security events makes it very “easy…for information overload to complicate the ability to respond to real threats among the benign events.”  

The bad actors aren’t easy to spot, especially since the average enterprise receives more than 10,000 events per day. We here at Click Security feel like the only answer is leverage. And leverage will have to come from indicators of compromise (not more malware signatures) that increasingly get better at separating signal from noise. Then all the understaffed security teams can be pointed to the right data (not big data, please), analyze it fast for patterns that – if presented visually – enable humans to see an activity pattern faster than a machine, then teach the machine this new analytic.  Rinse and repeat as in GTD.

Graphic: Click distills order out of chaotic enterprise data security events.