Cambridge, MA, Oct. 04, 2016 (GLOBE NEWSWIRE) -- Today, Sqrrl announced the joint release of the first-annual 2017 TAG Cyber Security Annual -- Practical Handbook and Reference Guide for the Working Cyber Security Professional. Sqrrl is part of an industry collective of 48 of the nation’s foremost cyber security vendors participating in the report, which was published by The Amoroso Group (TAG Cyber) following in-depth industry research and analysis. Sqrrl was the only Distinguished Vendor identified in the Security Analytics category.
“We were so happy to have actively participated in Ed Amoroso’s research initiative,” explained Mark Terenzoni, CEO of Sqrrl. “We agree that threat hunting and advanced analytics are required in Security Operations Centers.”
The report details a new urgency for how America’s commercial, financial and utility sectors respond to escalating and increasingly complex cyber attacks. It includes a comprehensive analysis of the cyber security industry with specific insights from C-level executives and thought leaders. Dr. Edward G. Amoroso, former chief security officer of AT&T and author of six books on cyber security, spearheaded writing and researching the report.
“The Sqrrl team was indispensable in helping me understand how analytics will be essential in stopping advanced attacks as the enterprise reinvents security solutions,” exlained Ed Amoroso.
The 2017 TAG Cyber Security Annual has been written for information security and technology professionals in all industries with a special focus on U.S. infrastructure companies, including energy, telecommunications, manufacturing, health care and utilities. The report will be available at no cost to all users as a free download on Sqrrl’s website.
The handbook is centered around a revolutionary new approach to cyber security that calls on tech leaders of the largest and most important American enterprises to explode existing infrastructure to disperse data across multiple platforms, offload sensitive information into secure cloud-based solutions and reload systems, policies and personnel to better position them to effectively defend against cyber attacks that are not only likely, but occurring at an increasing rate.
It includes three volumes:
- Volume 1: TAG Cyber Security Fifty Controls details the fifty primary control areas required for CISO teams to be effective in this new era of cybersecurity. These areas include traditional controls such as firewall platforms and two-factor authentication along with non-traditional controls such as security recruiting and security R&D. For each control area, an extensive list of supporting vendors is included to help jumpstart local source selection.
- Volume 2: Interviews with Distinguished Vendor Principals includes in-depth conversations with the thought leaders and distinguished vendor principals. It offers a brief digest of the expert guidance and cyber security insights offered by these industry authorities during the research stages of this report.
- Volume 3: TAG Cyber Security Vendor Listings serves as a reference guide to the cyber security industry. This comprehensive review includes nearly 1,400 vendors this year, with an additional 500 vendors to be incorporated into the 2018 report.
Sqrrl is the Threat Hunting Company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading threat hunting platform unites link analysis, User and Entity Behavior Analytics (UEBA), and multi-petabyte scalability capabilities into an integrated solution. Sqrrl’s unique approach enables security analysts to discover threats faster and reduces the time and resources required to investigate them. Learn more at http://sqrrl.com.
About TAG Cyber, LLC
The Amoroso Group (TAG Cyber) is a global cyber security advisory, training, consulting and media services company. Led by Edward Amoroso, industry veteran and former chief security officer for AT&T, TAG Cyber supports hundreds of companies around the world by providing a roadmap for identifying, preventing and eliminating cyber attacks on their systems and data.
Ely Kahn firstname.lastname@example.org 617-902-0784