Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

Firms Lack Malware Analysis, Incident Response Expertise: Study

Advanced threat detection capabilities require analysis of infections and incident response capabilities, which are typically lacking at small and midsize businesses, say solution providers.

The study, a blind survey of 200 malware analysts at U.S.-based enterprises conducted in October by independent market research firm Opinion Matters on behalf of ThreatTrack Security, found that there's a lack of highly skilled security pros capable of dealing with advanced threats and automated malware analysis necessary to thoroughly respond and contain threats.

About 40 percent of those surveyed indicated that businesses lack highly skilled personnel to combat cyberattacks effectively. Another 35 percent said automated tools to address the growing threat of custom malware is lacking in most IT departments. The survey shines a light on a new breed of advanced threat detection capabilities, mainly sandboxing technology used to examine suspicious file behavior and detect previously unknown malware strains.

[Related: SMBs Not Immune To Targeted Attacks ]

Solution providers said the focus on cyberespionage attacks and increasing sophistication of malware has put emphasis on detection technologies after an infection has already taken place. Most business executives realize that malware could already be lying dormant on their systems, said Jared Tobiasen, business development manager at Marlborough, Mass.-based Arrow Electronics. "It's been a manic industry lately with a lot of talk about advanced persistent threats," Tobiasen told CRN in a recent interview. "For some solution providers, getting a feel for truly understanding the threats and how to combat them can be extremely difficult out the gate."

Joseph Cordaro, a senior security architect at Dallas-based security firm Critical Start, said he's seen a rising interest in RSA's eCAT product, designed to inspect running processes and drivers in Windows-based systems to identify behavior related to advanced malware. RSA has been working on training partners to provide expertise to business clients that may not have large IT teams capable of dealing with threats and day-to-day issues all at once, Cordaro said.

"They're seeking technology and expertise and it's not always doable at the same time," Cordaro said in a recent interview. "You find that you've given yourself a lot more work when you find out what's already inside your network."

The ThreatTrack survey found that most attacks are being carried out in phishing email campaigns, with end users consistently clicking on malicious links in messages. Infected USB sticks also spread malware, and third-party applications, riddled with vulnerabilities, make it easier for attackers to gain an initial foothold into systems, survey respondents said.

The volume and complexity of malware threats tie up IT teams and cause expenses to increase rapidly, the survey found. Only 4 percent of malware analysts said they can analyze a sample in under an hour. In fact, more than 80 percent said it takes between one and five hours to conduct thorough analysis of a malware sample.

PUBLISHED NOV. 6, 2013

Back to Top

Video

 

sponsored resources