Four Keys to Effective 'Next-Generation'
Security
Today's targeted threats are often multi-vectored and exploit
unknown vulnerabilities - their sophistication defying typical
signature-only based inspection. Whether APTs or client-side
threats, they use evasive techniques to penetrate our organizations,
often purporting to be or riding on applications and exploiting
trust relationships with which we've grown all too comfortable with.
To make matters worse, attackers have realized the inadequacies of
traditional signature-based approaches and have accelerated the pace
of change and obfuscated their code through polymorphic
techniques. By doing so they can circumvent traditional
security protections.
As a result, companies are increasingly turning to
application-layer defenses with the theory that, by reducing the
attack surface, security teams can more narrowly focus remediation
efforts and preventative measures. Witness the genesis for the
current 'next-generation' security platform. One relatively new
arrival, the next-generation firewall (NGFW), typically combines the
ability to identify and control application use with classic
firewall functions. However, there is wide variance in what
'next-generation' really encompasses. This paper identifies four
crucial components that many deem elementary to true next-generation
security technology and that are required for effective protection
from today's advanced threats.
Published:
Nov 21, 2011
Length:
3
Type:
White Paper
Javascript Disabled To use our site, you must enable
JavaScript.
Browse Technology White Papers
Application
Integration ,
Analytical
Applications ,
Business
Intelligence ... more , Configuration
Management , Database
Development , Data
Integration , Data
Mining , Data
Protection , Data
Quality , Data
Replication , Database
Security , EDI ,
SOAP ,
Service
Oriented Architecture , Web
Service Management , Data
Warehousing less
Analog
Communications ,
Digital
Signal Processing ,
Electronic
Design Automation ... more , System
On A Chip , Electronic
Test and Measurement , Embedded
Design , Boards
& Modules , Embedded
Systems and Networking , Electromechanical
& Mechanical , Optoelectonics
& Displays , Packaging
and Interconnects , Passive
& Discrete Components , Power
Sources & Conditioning Devices , Integrated
Circuits and Semiconductors , Sensors
& Actuators less
Application
Integration ,
Application
Performance Management ... more , Best
Practices , Business
Activity Monitoring , Business
Analytics , Business
Integration , Business
Intelligence , Business
Management , Business
Metrics , Business
Process Automation , Business
Process Management , Call
Center Management , Call
Center Software , Change
Management , Corporate
Governance , Customer
Interaction Service , Customer
Relationship Management , Customer
Satisfaction , Customer
Service , EBusiness ,
Enterprise
Resource Planning , Enterprise
Software , EProcurement ,
Extranets ,
Groupware
Workflow , HIPAA
Compliance , IP
Faxing , IT
Spending , Marketing
Automation , Performance
Testing , Product
Lifecycle Management , Project
Management , Return
On Investment , Risk
Management , Sales
& Marketing Software , Sales
Automation , Server
Virtualization , Simulation
Software , Supply
Chain Management , System
Management Software , Total
Cost of Ownership , Video
Conferencing , Voice
Recognition , Voice
Over IP , Workforce
Management , Incentive
Compensation , Spend
Management , Manufacturing
Execution Systems , International
Computing less
Human
Resources Services ,
Payroll
Software ,
Time
and Attendance Software ... more , Workforce
Management Software , Financial
Management , Employee
Monitoring Software , Employee
Training Software , Recruiting
Software/Services , Employee
Performance Management , ELearning ,
Benefits
Management , Expense
Management less
Collaboration ,
Collaborative
Commerce ,
Contact
Management ... more , Content
Delivery , Content
Integration , Content
Management System , Corporate
Portals , Customer
Experience Management , Document
Management , Information
Management , Intranets ,
Messaging ,
Records
Management , Search
And Retrieval , Search
Engines , Secure
Content Management , SLA
less
Active
Directory ,
Bandwidth
Management ,
Convergence ,
Distributed
Computing ... more , Ethernet
Networking , Fibre
Channel , Gigabit
Networking , Governance ,
Grid
Computing , Infrastructure ,
Internetworking
Hardware , Interoperability ,
IP
Networks , IP
Telephony , Local
Area Networking , Load
Balancing , Migration ,
Monitoring ,
Network
Architecture , Network
Management , Network
Performance , Network
Performance Management , Network
Provisioning , Network
Security , OLAP ,
Optical
Networking , Quality
Of Service , Remote
Access , Remote
Network Management , Server
Hardware , Servers ,
Small
Business Networks , TCP/IP
Protocol , Test
And Measurement , Traffic
Management , Tunneling ,
Utility
Computing , VPN ,
Wide
Area Networks , Green
Computing , Cloud
Computing , Power
and Cooling , Data
Center Design and Management , Colocation
and Web Hosting less
AS/400 ,
Domino ,
Linux ,
Microsoft
Exchange ,
Oracle ,
PeopleSoft ... more , SAP ,
Siebel ,
Solaris ,
Tivoli ,
Unix ,
Web
Sphere , Windows ,
Windows
Server less
Access
Control ,
Anti
Spam ,
Anti
Spyware ,
Anti
Virus ,
Application
Security ... more , Auditing ,
Authentication ,
Biometrics ,
Business
Continuity , Compliance ,
DDoS ,
Disaster
Recovery , Email
Security , Encryption ,
Firewalls ,
Hacker
Detection , High
Availability , Identity
Management , Internet
Security , Intrusion
Detection , Intrusion
Prevention , IPSec ,
Network
Security Appliance , Password
Management , Patch
Management , Phishing ,
PKI ,
Policy
Based Management , Security
Management , Security
Policies , Single
Sign On , SSL ,
Secure
Instant Messaging , Web
Service Security , PCI
Compliance , Vulnerability
Management less
.NET ,
C++ ,
Database
Development ,
Java ,
Middleware ,
Open
Source ... more , Software
Outsourcing , Quality
Assurance , Scripting ,
SOAP ,
Software
Testing , Visual
Basic , Web
Development , Web
Services , Web
Service Security , XML
less
Backup
And Recovery ,
Blade
Servers ,
Clustering ,
IP
Storage ... more , ISCSI ,
Network
Attached Storage , RAID ,
Storage
Area Networks , Storage
Management , Storage
Virtualization , Email
Archiving , Data
Deduplication less
802.11 ,
Bluetooth ,
CDMA ,
GPS ,
Mobile
Computing ,
Mobile
Data Systems ... more , Mobile
Workers , PDA ,
RFID ,
Smart
Phones , WiFi ,
Wireless
Application Software , Wireless
Communications , Wireless
Hardware , Wireless
Infrastructure , Wireless
Messaging , Wireless
Phones , Wireless
Security , Wireless
Service Providers , WLAN
less