No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home GRC Vendor News

LightCyber Introduces New Tools for Corporate Security Assurance

by Corporate Compliance Insights
February 1, 2017
in GRC Vendor News
LightCyber Introduces New Tools for Corporate Security Assurance

New Reporting Assures Boards and Executives That Networks are Free from Attackers, and New Efficiency Metrics Confirm Operational Expense Benefits of Magna Platform

Los Altos, Calif., and Ramat Gan, Israel (February 1, 2017) – LightCyber, a leading provider of Behavioral Attack Detection solutions, today announced new tools that equip enterprises to meet increasing board demands for security accountability and compliance with internal and industry regulations, such as the General Data Protection Regulation (GDPR). LightCyber also introduced updated metrics from customer production systems and an online calculator so that prospective customers can quickly and easily assess current operational efficiency and the gains that they will receive from a LightCyber Magna deployment.

“Clearly traditional security infrastructure is failing to curtail network attacks leading to a data breach or damage to an organization’s most critical assets and resources,” said Jason Matlof, Executive Vice President, LightCyber. “One dominant reason for the rising inability to find network attackers is the vast number of security alerts and the low level of accuracy for which security teams have to contend. Traditional enterprise security vendors have not properly armed security operators with the tools need to accurately know whether or not an attacker is present on their network. Boards and executives will no longer accept this level of uncertainty and are demanding more definitive confirmation of security assurance.”

Security Assurance

Boards, executives and other oversight groups are increasingly demanding definitive reports from their IT organizations that attests that the enterprise network is free from active attackers — either malicious insiders or targeted external attackers. Given the historical inaccuracy of traditional security system alerts, this type of definitive summary report was virtually impossible to generate for the average enterprise. The new Security Assurance report from LightCyber Magna demonstrates the summary status of attack behavior and can demonstrate when all anomalous attack behaviors are resolved or remediated. The report serves as an important component for security accountability in an age when most attacks can only be detected after the damage is done.

Wasted Time and Wild Goose Chases

One reason for security operators’ inability to definitely attest to the organizational security posture using traditional security tools is the vast number of alerts with a low level of accuracy produced by those systems. A survey conducted by the Ponemon Institute showed that 68 percent of security operations teams spend a significant amount of time dealing with false positive alerts with more than half their time wasted on alerts that are not productive. This type of gross system inaccuracy drives great inefficiencies that prevent security organizations from effectively assuring their organizational leadership of their security.

The new LightCyber Security Operations Center (SOC) OPEX Calculator helps quantify the accuracy and efficiency of security tools and their impact on security teams. According to the Gartner Market Guide for User and Entity Behavior Analytics, published on December 8, 2016, “Some large Gartner clients receive from 500,000 to 1 million alerts a day across multiple security monitoring systems, such as SIEM and DLP.”

The LightCyber SOC OPEX Calculator is based upon accuracy and efficiency metrics data aggregated and anonymized from customer production deployments. In the period from July 1, 2016 to December 31, 2016, LightCyber customers achieved a mean efficiency of 0.9 alerts per 1,000 endpoints per day. For example, a company with 5,000 endpoints would expect to receive 4.5 total alerts per day from LightCyber Magna. The mean accuracy reported for LightCyber customers is 99 percent for confirmed alerts and 61 percent percent for all alerts, which is a measure of the alerts usefulness according to user classification.

“Why should security professionals continue to accept hundreds or thousands of alerts per hour or day from their security systems when the vast majority of alerts lack any real value?” said Jim Broome, President of Direct Defense and security assessment expert. “Many of our clients are buried in far more security alerts than they can possibly review.” One LightCyber customer claimed that they had been receiving about 20,000 alerts per week just from their IPS. The Chief Information Security Officer (CISO) quipped, “Having a thousand alerts is nearly the same as getting a million — the number is too big to investigate a meaningful fraction of them.”

The Security Assurance report is available now, and the SOC OPEX Calculator is now live on the LightCyber website and freely available for anyone to use.  Take the SOC OPEX assessment using the online calculator today.

Resources

  • Infographic and Blog on Security Assurance
  • Security Assurance Information Page and Free Evaluation
  • SOC OPEX Calculator
  • Accuracy and Efficiency Information Page

About LightCyber

LightCyber is a leading provider of Behavioral Attack Detection solutions that provide accurate and efficient security visibility into attacks that have slipped through the cracks of traditional security controls. The LightCyber Magna™ platform is the first security product to integrate user, network and end-point context to provide security visibility into a range of attack activity. Founded in 2012 and led by world-class cybersecurity experts, the company’s products have been successfully deployed by top-tier customers around the world in industries including the financial, legal, telecom, government, media and technology sectors.  For more information, please visit http://www.lightcyber.com or follow us on Twitter, LinkedIn and Facebook.


Previous Post

SEC Releases 2017 Examination Priorities

Next Post

CII Report on Proxy Access Bylaws at U.S. Companies Finds Consensus on Key Provisions

Corporate Compliance Insights

Corporate Compliance Insights

Corporate Compliance Insights

Related Posts

robot nurturing a good idea

Innovation vs. Compliance: In the Age of AI, Why Not Both?

by Asha Palmer
June 17, 2025

As governments scramble to regulate AI, forward-thinking companies are writing their own compliance playbooks

human robot working as team pie chart

Smart Machines, Smarter Humans: Why Compliance Still Needs a Human Touch

by Roman Eloshvili
June 17, 2025

From the 2008 financial crisis to everyday judgment calls, the case for keeping humans in the compliance loop

data privacy leader concept

Who’s Minding Your Data? The Case for Dedicated Privacy Leadership

by Daniel Barber
June 16, 2025

As state privacy laws multiply and AI introduces new vulnerabilities, the question isn't whether you need dedicated privacy expertise —...

abstract obscured data colorful

NIST’s Differential Privacy Guidelines: 6 Critical Areas for Secure Implementation

by Michelle Drolet
June 16, 2025

Standard de-identification methods remain vulnerable to sophisticated attacks, but differential privacy offers mathematical guarantees that scale with emerging threats

Next Post
CII Report on Proxy Access Bylaws at U.S. Companies Finds Consensus on Key Provisions

CII Report on Proxy Access Bylaws at U.S. Companies Finds Consensus on Key Provisions

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights