Blog Zscaler

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Products & Solutions

Time to Get Real About Real-Time Threat Monitoring

image
DAVE BARNETT
maggio 02, 2013 - 3 Minuti di lettura

One of the greatest challenges we face as security professionals is the ability to understand what is happening right now. While we seem to be reacting to problems as they arise, in fact what we are doing is dealing with the after effects of a breach. Both data leakage and the disruption caused by a breach such as Aramco last year can cause significant harm to an organization.

One of the greatest challenges we face as security professionals is the ability to understand what is happening right now. While we seem to be reacting to problems as they arise, in fact what we are doing is dealing with the after effects of a breach. Both data leakage and the disruption caused by a breach such as Aramco last year can cause significant harm to an organization.Image

The advantage of the attackesr is their stealth, they are hoping to slip into your organization unnoticed and identify their target to achieve their aims. If the attackers never needed to communicate with the outside world, they could quietly go about their business in your network and remain largely undetected. Their weakness is the need to communicate with the outside world and this can be turned to our advantage.

Our advantage as a defender is time. The sooner we are able to spot the evidence that an attack is underway, the sooner we are able to take appropriate action and limit the damage. The difficulty is that we need to be looking in the right place at the right time. To a certain degree, we are limited by the tools we have available to us. IT budget cycles typically are on a three to four year period and what may have fit the purpose then may not be the right tool today. In a world where the Internet is evolving so rapidly and where users are becoming increasingly mobile and social; static appliance based security is not enough.

The Security Cloud is ideally suited to providing a near real-time view of every communication made both into and out of an organization from any device anywhere. For example, your security team could instantly see that a connection has been made at 3:30 am from a machine located on the other side of the world to a host that has recently been identified as a botnet controller.

The team could rapidly mine the billions of transactions stored in The Security Cloud to identify how many machines have connected to that new address in the past. By working closely with our partners in the security industry to share new threat information, we can ensure that as a community we are providing the best possible security intelligence. 

form submtited
Grazie per aver letto

Questo post è stato utile?

Esclusione di responsabilità: questo articolo del blog è stato creato da Zscaler esclusivamente a scopo informativo ed è fornito "così com'è", senza alcuna garanzia circa l'accuratezza, la completezza o l'affidabilità dei contenuti. Zscaler declina ogni responsabilità per eventuali errori o omissioni, così come per le eventuali azioni intraprese sulla base delle informazioni fornite. Eventuali link a siti web o risorse di terze parti sono offerti unicamente per praticità, e Zscaler non è responsabile del relativo contenuto, né delle pratiche adottate. Tutti i contenuti sono soggetti a modifiche senza preavviso. Accedendo a questo blog, l'utente accetta le presenti condizioni e riconosce di essere l'unico responsabile della verifica e dell'uso delle informazioni secondo quanto appropriato per rispondere alle proprie esigenze.

Ricevi gli ultimi aggiornamenti dal blog di Zscaler nella tua casella di posta

Inviando il modulo, si accetta la nostra Informativa sulla privacy.