Tribune Media relies on Vectra to fortify its cyber security infrastructure
To boost its cyber security efforts, Tribune Media Group relies on the Vectra automated threat management solution to protect its broadcast and digital media facilities from targeted attacks.
With Vectra, Tribune Media instantly identifies attack behaviors and infected hosts inside the network. In real time, Vectra prioritizes attacks that pose the highest risk so the Tribune Media cyber security team can promptly mitigate a threat and prevent data loss.
Threat detection on steroids
"Vectra is threat detection on steroids," said Duane Smith, Tribune Media chief information security officer. "It does all the work for me. If there’s a cyber security threat, Vectra quickly digs deeper and shows me the root cause."
Taking the guesswork out of cyber security
Tribune Media deployed Vectra X-series platform at its Chicago data center for visibility into internal and Internet-bound network traffic. It also deployed Vectra S-series sensors to detect cyber security threats at 42 remote broadcast facilities.
"Every security organization’s biggest challenge is knowing what you don’t know," Smith noted. "Vectra takes the guesswork out of detecting credible threats, and I saw immediately value in that."
Detect cyber security breaches at Tribune Media's headquarters and broadcast stations
Real-time visibility into network breaches
- Identified unexpected and unknown security threats Gained single view of threats across the enterprise network, including remote sites
- Prevented wasting time uncovering false positives
Read the Case Study
IT security is an ongoing exercise in ROI and operational efficiency. Organizations have a limited set of resources to address an unlimited set of risks, threats and attackers. This asymmetry means that security products must always be evaluated in terms of efficacy as well as their impact on the operational fitness of the organization. Is a solution a drain on manpower and resources or does it make staff more productive and nimble?
IDS and IPS have their rightful places, but they are no longer simply deployment options of the same thing. Today’s persistent attacks dictate that threat intelligence and enforcement must be separated and optimized for their respective purposes.
Check out the cool infographic
While remote offices, clinics, bank branches, and retail locations are critical to the success of an organization, they often lack the same security protections found at the headquarters or data center.