Zscalerのブログ

Zscalerの最新ブログ情報を受信

Products & Solutions

Time to Get Real About Real-Time Threat Monitoring

image
DAVE BARNETT
May 02, 2013 - 3 分で読了

One of the greatest challenges we face as security professionals is the ability to understand what is happening right now. While we seem to be reacting to problems as they arise, in fact what we are doing is dealing with the after effects of a breach. Both data leakage and the disruption caused by a breach such as Aramco last year can cause significant harm to an organization.

One of the greatest challenges we face as security professionals is the ability to understand what is happening right now. While we seem to be reacting to problems as they arise, in fact what we are doing is dealing with the after effects of a breach. Both data leakage and the disruption caused by a breach such as Aramco last year can cause significant harm to an organization.Image

The advantage of the attackesr is their stealth, they are hoping to slip into your organization unnoticed and identify their target to achieve their aims. If the attackers never needed to communicate with the outside world, they could quietly go about their business in your network and remain largely undetected. Their weakness is the need to communicate with the outside world and this can be turned to our advantage.

Our advantage as a defender is time. The sooner we are able to spot the evidence that an attack is underway, the sooner we are able to take appropriate action and limit the damage. The difficulty is that we need to be looking in the right place at the right time. To a certain degree, we are limited by the tools we have available to us. IT budget cycles typically are on a three to four year period and what may have fit the purpose then may not be the right tool today. In a world where the Internet is evolving so rapidly and where users are becoming increasingly mobile and social; static appliance based security is not enough.

The Security Cloud is ideally suited to providing a near real-time view of every communication made both into and out of an organization from any device anywhere. For example, your security team could instantly see that a connection has been made at 3:30 am from a machine located on the other side of the world to a host that has recently been identified as a botnet controller.

The team could rapidly mine the billions of transactions stored in The Security Cloud to identify how many machines have connected to that new address in the past. By working closely with our partners in the security industry to share new threat information, we can ensure that as a community we are providing the best possible security intelligence. 

form submtited
お読みいただきありがとうございました

このブログは役に立ちましたか?

免責事項:このブログは、Zscalerが情報提供のみを目的として作成したものであり、「現状のまま」提供されています。記載された内容の正確性、完全性、信頼性については一切保証されません。Zscalerは、ブログ内の情報の誤りや欠如、またはその情報に基づいて行われるいかなる行為に関して一切の責任を負いません。また、ブログ内でリンクされているサードパーティーのWebサイトおよびリソースは、利便性のみを目的として提供されており、その内容や運用についても一切の責任を負いません。すべての内容は予告なく変更される場合があります。このブログにアクセスすることで、これらの条件に同意し、情報の確認および使用は自己責任で行うことを理解したものとみなされます。

Zscalerの最新ブログ情報を受信

このフォームを送信することで、Zscalerのプライバシー ポリシーに同意したものとみなされます。