Sunday, June 30, 2013

Relentless Attacks Demand Continuous Security

altby Jason Brvenik

Attackers areusing time and patience to their advantage. Yet traditionalsecurity technologies can only detect an attack at a point in time, which onits own is limiting when dealing with sophisticated threats that can disguisethemselves as safe and become malicious tomorrow, or next week. If you missthat one shot at identifying and blocking a threat, then most IT securityprofessionals have no way to continue to monitor that file once it enters thenetwork and take action if it turns out to be malware.

What’s needed is a new, continuous security model that allowsdefenders to constantly track, analyze and be alerted to files previouslyclassified as ‘safe’ or ‘unknown’ but subsequently identified as malware. Then,they need to be able to take action to quarantine those files, remediate andcreate protections to prevent the risk of reinfection.

]]>

View the original article here

No comments:

Post a Comment