Six Tips for Protecting Critical Data Against Advanced Evasion Techniques - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Tips for Protecting Critical Data Against Advanced Evasion Techniques-4 Next

When possible, patching vulnerable systems provides ultimate protection against network attacks, regardless of whether they have been delivered by AETs. Evasions may help the attacker bypass IPS or next generation firewalls (NGFW), but they cannot actually attack a patched system. However, because patch testing and deployment takes time under even the best circumstances, additional IPS and security measures must be taken.

To help organizations protect their networks against the threat of advanced evasion techniques (AETs), Stonesoft shares six tips for the protection of critical data assets and systems. Stonesoft, a provider of integrated network security and business continuity solutions, announced the first discovery of AETs in fall 2010.

“Today’s professional attackers are more sophisticated and focused than ever before. They go through great pains to avoid detection by legacy security solutions and processes. There is no quick fix, but progressive security professionals and security vendors constantly search for new techniques to improve defensive capabilities.”

According to Stonesoft, by challenging the rules of traditional evasion techniques and combining multiple evasions, AETs are currently undetectable by existing network security systems, like intrusion prevention systems (IPS) and other traffic inspection devices. Since the first discovery of this new category of network security threats, more than 145 AETs have been delivered to the Computer Emergency Response Team in Finland (CERT-FI), which has issued multiple advisories to vendors as part of their global vulnerability coordination efforts. Reaction from the vendor community to these advisories has been mixed.

Ted Julian, principal analyst at Yankee Group comments: “Today’s professional attackers are more sophisticated and focused than ever before. They go through great pains to avoid detection by legacy security solutions and processes. There is no quick fix, but progressive security professionals and security vendors constantly search for new techniques to improve defensive capabilities.”

Stonesoft has organized the following six tips to increase protection of critical data and system assets.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.