A.N. Ananth

1394 0

A.N. Ananth

A.N. Ananth is the co-founder and CEO of EventTracker. He was one of the original architects of the EventTracker enterprise log management solution. “Ananth” has an extensive background in product development and operations for telecom network management and has consulted for companies on compliance strategy, audit policy and automated reporting processes.

A leading expert on IT compliance with over 20 years experience in IT-control and operations, Ananth is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

Prior to EventTracker, Ananth worked on product development for companies including Ciena, Westinghouse Wireless and Equatorial Communications.

He holds a MSEE from the University of Texas.

Articles by A.N. Ananth


Co-Sourcing Can Help Financial Institutions Comply With Cybersecurity Regulations

Financial institutions have until Oct. 2017 to comply with many of the New York State Department of Financial Services (DFS) Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500). Affected companies must issue a certificate of compliance by Feb. 15, 2018 for certain parts of the regulation. The law, which took effect on March 1, …


Honeypots Versus Threat Intelligence

When faced with daily reports of security breaches in global entities like SWIFT and Fortune 500 companies, and small enterprises being held hostage with ransomware, it’s understandable that finding and buying the ‘Next Big Thing’ in security is paramount on your IT security wishlist. However, before investing resources and funds in the next silver bullet …


What are the Challenges and Benefits of Outsourcing your Security Functions?

Information Security Buzz Expert Panel Question – May  Gartner forecasts that the total security outsourcing market will grow from $14.1 billion in 2014 to $24.5 billion in 2019 at a compound annual growth rate (CAGR) of 14.8% — making it the highest-growing security services market. What are the challenges and benefits of outsourcing your security …

1 comment
Endpoint Threat Detection and Response

Endpoint Threat Detection and Response

The evidence from 2015 is clear: traditional signature-based end-point protection is ineffective against the modern attack, which is persistent and targets zero-day vulnerabilities. Here are some factoids for consideration: Today organizations are facing threats that are more complicated and move too quickly for traditional information security tools to address. Attackers that seek only to disrupt …

equation malware

5 Myths about Threat Intelligence

In the spirit of The Washington Post’s regular column, “5 Myths,” here is “a challenge to everything you think you know” about Threat Intelligence. You may already know that cyber threat intelligence from both internal and external sources can provide value when it is researched, analyzed and disseminated correctly. The benefits include: Changing an organization’s …