Six Tips for Protecting Critical Data Against Advanced Evasion Techniques - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Tips for Protecting Critical Data Against Advanced Evasion Techniques-6 Next

Centralized management plays a crucial role in protecting against AETs. It allows organizations to automate AET updates and schedule software upgrades remotely and effortlessly, thus making sure they always deploy the best possible protection against AETs.

To help organizations protect their networks against the threat of advanced evasion techniques (AETs), Stonesoft shares six tips for the protection of critical data assets and systems. Stonesoft, a provider of integrated network security and business continuity solutions, announced the first discovery of AETs in fall 2010.

“Today’s professional attackers are more sophisticated and focused than ever before. They go through great pains to avoid detection by legacy security solutions and processes. There is no quick fix, but progressive security professionals and security vendors constantly search for new techniques to improve defensive capabilities.”

According to Stonesoft, by challenging the rules of traditional evasion techniques and combining multiple evasions, AETs are currently undetectable by existing network security systems, like intrusion prevention systems (IPS) and other traffic inspection devices. Since the first discovery of this new category of network security threats, more than 145 AETs have been delivered to the Computer Emergency Response Team in Finland (CERT-FI), which has issued multiple advisories to vendors as part of their global vulnerability coordination efforts. Reaction from the vendor community to these advisories has been mixed.

Ted Julian, principal analyst at Yankee Group comments: “Today’s professional attackers are more sophisticated and focused than ever before. They go through great pains to avoid detection by legacy security solutions and processes. There is no quick fix, but progressive security professionals and security vendors constantly search for new techniques to improve defensive capabilities.”

Stonesoft has organized the following six tips to increase protection of critical data and system assets.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.