The 2005 blockbuster movie, Wallace & Gromit: The Curse of the Were-Rabbit, saw the dynamic claymation duo starting a new pest control service, Anti-Pesto, to protect their towns prize produce in the run-up to Lady Tottingtons annual Giant Vegetable Competition.The release of the DVD version gives an excellent opportunity to look back at the film, and at the lessons in enterprise security it contains for CSOs. Looked at in the right way, it gives key examples of how to protect core business systems and data against all types of security exploitsgiant variants of the species lepus notwithstanding.Vegetable PlotWhen the townsfolks vegetable patches come under attack from hordes of hungry bunnies, Wallace sets up Anti-Pesto, offering a sophisticated managed security service provider (MSSP) approach to protecting prize veggies.In the event of a creature snacking on home-grown produce, the Anti-Pesto service not only raises alerts at the operations nerve-center in Wallace and Gromits house, it also escalates alerts into remedial action. It pinpoints the location of the unwanted attack so that it can be swiftly neutralized by a flying visit from the Anti-Pesto team, before damage is done to the comestibles. Whats more, the service highlights threats across different allotments in real time to give an overall picture of the number and scale of attacks. This approach is an excellent example for managing an enterprises security status, in line with the current thinking from influential bodies such as The Jericho Forum. In effect, Anti-Pesto uses a primitive form of core security event management (CSEM) to deliver its services, as follows. Security StewFirst, Anti-Pesto shows that its vital to protect not only the organizations perimeterwhether its the fence around the vegetable plot or the corporate firewallsbut to extend security to the core business assets, whether theyre prize marrows or an organizations SAP ERP system.Its only by having visibility of whats happening with those core assets, identifying any unusual activity or excursions from policies, and correlating core events with other peripheral alerts, that the IT team can act decisively to close a potential security breach.As an example, if a mission-critical Oracle server is targeted by an attack to which its vulnerable, the core security solution can give an immediate high-level alert. However, if the server has already been patched against the vulnerability that the attack seeks to exploit, this fact can be correlated against the attack, and the IT team given a low-level alert because the actual risk to the business asset is lower.The right security management solution gives IT teams a more effective way to tackle security holes, by correlating and prioritizing alerts according to the target systems actual vulnerability, security and business status.Taking StockAt the Anti-Pesto nerve center, the display of all the vegetable patches being monitored can be likened to a central security management console. It enables Wallace and Gromit to quickly assess the overall security stance, to tailor their activities accordingly and to take fast, targeted remedial action to close any breaches when they occur.Once again, this is an excellent approach to IT security management. Corporate IT teams have to look after a range of core business systems, security devices and solutions, which usually means using a range of different management consoles and dashboards. Trying to imagine the overall security stance from a battery of consoles can blur the IT teams vision. This means running the risk of missing a security threat amid the background noise, while the IT staff try to sort fragments of events into a coherent picture.Screening AlertsJust like the Anti-Pesto solution, CSEM unifies security management for both traditional point security products and core internal systems. It integrates multiple consoles and reporting formats to simplify management, correlating data and event logs from core business systems and security devices into one central engine. This helps identify and place in context irregular activities or attempted attacks that are otherwise invisible. This gives IT staff a clearer view of events at any point on the network as it occurs, and improves response times by drastically reducing the log traffic generated by multiple systems. It gives an end-to-end view of network activity, reporting on any changes to business assets and datawhere security is most needed. And it also helps with incident handling and resolution by pinpointing the breach and suggesting responses. Extra HelpingsOf course, a true CSEM solution goes beyond anything that Anti-Pesto could offer. It should enable those using itwhether end-users or MSSPsto document, measure and report on key performance indicators against security policies and service level agreements, to ensure that all parties are reassured of obtaining value for money. After all, a solution promising to boost efficiency should be able to demonstrate measurable returns. So is the Wallace and Gromit movie a case of art imitating life? Its certain that enterprise security could learn something by taking a leaf from Anti-Pesto and building on the example set by the plasticine pals. Jason Holloway is vice-president, UK for ExaProtect. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe