Enviar pesquisa
Carregar
Why network based security
•
0 gostou
•
369 visualizações
Alan Rudd
Seguir
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 6
Baixar agora
Baixar para ler offline
Recomendados
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Netpluz Asia Pte Ltd
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Proofpoint
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
Alan Rudd
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
Proofpoint
Impacts cloud remote_workforce
Impacts cloud remote_workforce
Rodrigo Varas
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
Recomendados
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Netpluz Asia Pte Ltd
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Proofpoint
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
Alan Rudd
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
Proofpoint
Impacts cloud remote_workforce
Impacts cloud remote_workforce
Rodrigo Varas
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
Proactive incident response
Proactive incident response
Brian Honan
beyond_the_firewall_0103
beyond_the_firewall_0103
Jack McCullough
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned.
Proofpoint
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
CloudLock
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Proofpoint
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
A Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
Cisa ransomware guide
Cisa ransomware guide
anpapathanasiou
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
Jose Lopez
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
patmisasi
Youtube marketing jobs
Youtube marketing jobs
selinasimpson842
DNS Windows Server 2008
DNS Windows Server 2008
Ichsanvoc
Mais conteúdo relacionado
Mais procurados
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
Proactive incident response
Proactive incident response
Brian Honan
beyond_the_firewall_0103
beyond_the_firewall_0103
Jack McCullough
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned.
Proofpoint
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
CloudLock
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Proofpoint
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
A Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
Cisa ransomware guide
Cisa ransomware guide
anpapathanasiou
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
Jose Lopez
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
patmisasi
Mais procurados
(20)
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
Proactive incident response
Proactive incident response
beyond_the_firewall_0103
beyond_the_firewall_0103
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned.
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
A Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Cisa ransomware guide
Cisa ransomware guide
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Destaque
Youtube marketing jobs
Youtube marketing jobs
selinasimpson842
DNS Windows Server 2008
DNS Windows Server 2008
Ichsanvoc
Anuario estadístico América Latina 2013
Anuario estadístico América Latina 2013
Manager Asesores
resume
resume
harsh vardhan
The Quantified Self Launch
The Quantified Self Launch
mctasandc
Representations in Computer Vision
Representations in Computer Vision
Alessandro Ortis
n
n
nastyshka02
Huffman
Huffman
tumetr
USA
USA
A. JEROME -
Sukacita
Sukacita
theresiaputri04
Transcultural Aspects of Depression in Epilepsy
Transcultural Aspects of Depression in Epilepsy
Neurokrish - the neuropsychiatry centre
DECENTRALISATION
DECENTRALISATION
Lakshmi R Menon
Căn hộ chuẩn Singapore lọt giữa lòng Sài Gòn
Căn hộ chuẩn Singapore lọt giữa lòng Sài Gòn
Khoaairblade
Tarea#2 sofia valladares
Tarea#2 sofia valladares
Karen Sofía Valladares Guamaní
Big data and hadoop lightining talk
Big data and hadoop lightining talk
Esther Kundin
Tugas kkpi nadhatul_ilmi_smith
Tugas kkpi nadhatul_ilmi_smith
ilminadhatul
2014 2015 ieee matlab power system projects titles list globalsoft technologies
2014 2015 ieee matlab power system projects titles list globalsoft technologies
IEEEMATLABPROJECTS
00. erasmus+ dat sur-cn-ei
00. erasmus+ dat sur-cn-ei
compatiendoexperiencias
Destaque
(18)
Youtube marketing jobs
Youtube marketing jobs
DNS Windows Server 2008
DNS Windows Server 2008
Anuario estadístico América Latina 2013
Anuario estadístico América Latina 2013
resume
resume
The Quantified Self Launch
The Quantified Self Launch
Representations in Computer Vision
Representations in Computer Vision
n
n
Huffman
Huffman
USA
USA
Sukacita
Sukacita
Transcultural Aspects of Depression in Epilepsy
Transcultural Aspects of Depression in Epilepsy
DECENTRALISATION
DECENTRALISATION
Căn hộ chuẩn Singapore lọt giữa lòng Sài Gòn
Căn hộ chuẩn Singapore lọt giữa lòng Sài Gòn
Tarea#2 sofia valladares
Tarea#2 sofia valladares
Big data and hadoop lightining talk
Big data and hadoop lightining talk
Tugas kkpi nadhatul_ilmi_smith
Tugas kkpi nadhatul_ilmi_smith
2014 2015 ieee matlab power system projects titles list globalsoft technologies
2014 2015 ieee matlab power system projects titles list globalsoft technologies
00. erasmus+ dat sur-cn-ei
00. erasmus+ dat sur-cn-ei
Semelhante a Why network based security
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
5 network-security-threats
5 network-security-threats
ReadWrite
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
16231
16231
James Grant
Threat Intelligen.pptx
Threat Intelligen.pptx
CompanySeceon
Security Threats for SMBs
Security Threats for SMBs
GFI Software
Securing Your Work from Home.pdf
Securing Your Work from Home.pdf
KavitaDubey18
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
What is cyber security
What is cyber security
SAHANAHK
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
Susan Darby
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Jose Lopez
Vendor Landscape: Email Security Gateway
Vendor Landscape: Email Security Gateway
Info-Tech Research Group
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Organization
IT security threats and endpoint security
IT security threats and endpoint security
Acutec Limited
Semelhante a Why network based security
(20)
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
5 network-security-threats
5 network-security-threats
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
16231
16231
Threat Intelligen.pptx
Threat Intelligen.pptx
Security Threats for SMBs
Security Threats for SMBs
Securing Your Work from Home.pdf
Securing Your Work from Home.pdf
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
What is cyber security
What is cyber security
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Vendor Landscape: Email Security Gateway
Vendor Landscape: Email Security Gateway
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
IT security threats and endpoint security
IT security threats and endpoint security
Why network based security
1.
Executive Brief Why a
Network-based Security Solution is Better than Using Point Solutions Architectures A QuinStreet Executive Brief. © 2015 In This Paper • Many threats today rely on newly discovered vulnerabilities or exploits • CPE-based solutions alone often are strained when dealing with today’s threat environment • Network-based security offers threat intelligence to complement CPE solutions
2.
© 2015, QuinStreet,
Inc. Why a Network-based Security Solution is Better 1 Introduction As security requirements and cyber threats keep evolving, network-based security that relies on monitoring command and control servers, suspect sites and IP addresses, and Netflow sessions, as well as looking for unusual activity, brings many benefits. In particular, network-based security offers enhanced protection against the growing number of unknown threats that are hard to block when using customer premises equipment (CPE) point solutions. Such solutions have the added disadvantage of being labor-intensive to manage, thus adding to operational costs. Changing threat environment Companies today are subject to evolving and ever-more sophisticated cyber threats. Many of the new forms of attack, such as blended attacks that combine multiple types of attacks, advanced persistent threats, and botnet-based attacks that deliver spam or overwhelm a site via a distributed denial of service (DDoS) attack, are harder to detect, prevent, or parry than attacks of old. In most cases, today’s threats are more complex and rely on newly discovered vulnerabilities or exploits. Additionally, in several recently discovered large breaches such as the ones at Target, Home Depot, and Sony, criminals and political activists have shown their persistence and determination by using multiple levels of attacks over a long time period. In those cases and others, one or a handful of corporate or business partner machines or user accounts were compromised. Those systems or accounts were then used to carry out additional infections or data collection efforts over time. In many instances, data collected was subsequently used to socially engineer even more sophisticated attacks. A good example of the methods and patience being employed today can be seen in a recent discoveryi of an attack where, for more than a year, a group of cybercriminals pilfered email correspondence from more than 100 organizations (most of them publicly traded healthcare or pharmaceutical companies) in pursuit of information significant enough to affect global financial markets. With today’s complex attacks, traditional approaches to defending against cyber threats are often ineffective. Signature-based solutions do not recognize attacks based on zero-day exploits. And point solutions frequently miss multi-pronged attacks. Recent large-scale breaches illustrate the challenges companies face when battling today’s cyber thieves. For instance, they frequently use socially “Many threats today rely on newly discovered vulnerabilities or exploits.”
3.
© 2015, QuinStreet,
Inc. Why a Network-based Security Solution is Better 2 engineered phishing attacks, which are highly effective compared to traditional spamii . Email recipients deem these poisoned messages safe (or at least from a legitimate source), let their guard down, and open an attachment or click on a link they otherwise would avoid. This gives the thieves a foot in the door, which is then used to collect data or launch additional and different types of attacks. With some compound attacks, hackers infiltrate a third party (a supply chain partner, insurance processor, or credit card clearing service, for example) and then bide their time posing as an authorized user, all the while collecting information that can be used either in a more targeted attack or to steal information. Compounding the impact of today’s more effective socially engineered attacks is the fact that hackers are resorting to zero-day exploits more than in the past. In 2014 there was an uptick in zero-day attacks due in part to the availability of the Elderwood platform, which is a set of exploits packaged so they can be used by non-technical crooks.iii These factors are making it harder to protect an organization’s systems and data. Issues to consider with CPE point solutions This changing threat environment has great implications when using traditional security solutions. To start, signature-based approaches to fighting malware require frequent updates, but even worse they detect only known viruses, Trojans, keyloggers, and other malicious software. The rise in attacks using zero-day exploits makes this a serious problem since most antivirus products will miss nine out of 10 zero-day malware threats.iv Likely avenues for malware to compromise an organization’s system have not changed much, but the techniques used to deliver the malware have. That carries implications for CPE solutions. In particular, a major entry point for malware is still an employee opening an infected e-mail attachment and unwittingly clicking on an infected URL while surfing the Web. Unfortunately, hackers now have the upper hand by using socially-engineered phishing attacks and shortened URLs on social media sites. Such methods make it harder to protect systems. Most organizations seem to realize this is a critical issue. One recent survey found that 62 percent of respondents said their endpoint security software was not effective for detecting zero-day or polymorphic malware delivered in this manner.v Certainly, most companies use more than just anti-malware software. In fact, it is quite common to use a combination of CPE equipment like next-gen firewalls, IDS/IPS, and email and URL filtering systems. “Traditional approaches to defending against cyber threats are often ineffective.”
4.
© 2015, QuinStreet,
Inc. Why a Network-based Security Solution is Better 3 However, there are several problems with using multiple CPE point solutions. First, such solutions are labor-intensive to manage, requiring frequent updates. This has driven the cost of security to new levels. A 1,000 person organization typically spends between $500,000 and $800,000 on security.vi A second issue with using multiple CPE point solutions is that many of the solutions do not share information and thus do not provide the needed synergistic level of threat analysis insight that could help reduce exposure to many of today’s blended and compound threats. Furthermore, a CPE-based approach does not provide information about the source of new threats nor does it spot abnormal activities that would indicate malicious activity in the making. For example, a company would not necessarily know that spoofed email was being delivered from an IP address in North Korea. Nor would a company be able to detect a command–and-control session originating from outside the company but interacting with a server behind the firewall. Simply put, tried and true CPE- based security solutions are strained when dealing with today’s threat environment. How network-based security helps: Capabilities that a network-based security solution can offer Increasingly, organizations are looking to network-based security solutions to not only provide advanced protection, but also to deliver threat intelligence to complement the security offered by CPE solutions. For example, companies for years have relied on network-based services to reduce threats reaching their facilities. Services included malware protection, spam filtering, and the blocking of URLs from known malicious sites. These services offer several advantages. First, they are managed by the provider and thus offload the work of updating new malware signatures and managing firewalls and intrusion detection/prevention systems. Second, providers typically have security expertise and knowledge of new threats that companies may simply lack. Specifically, while IT staff in a company might not have the time to keep current on the latest types of attacks and methods to parry them, a provider would be expected to have such capabilities. And third, these services block known threats from reaching a company in the first place. Moreover, network-based security solutions can provide an additional layer of security, enhancing the effectiveness of installed CPE solutions. For example, a network- based malware detection and email filtering solution could reduce the volume of spam reaching a company, allowing for a more modest investment in CPE equipment. In many cases, newer network-based security services can help identify threats earlier in their lifecycle, and in some cases prevent the consequences of unknown threats. However, to do this requires much more information. An ideal service would need to collect threat intelligence gleaned from extensive monitoring of packets, infected machines, network traffic, and sessions. Analysis of this information could then be used to help identify potential malicious activity such as data theft indicated by data flow to a suspect IP address or a large amount of spam or network traffic coming from out-of-country IP addresses and servers, for example. “Most antivirus products will miss nine out of 10 zero-day malware threats.”
5.
© 2015, QuinStreet,
Inc. Why a Network-based Security Solution is Better 4 Additionally, a network-based approach offered by a suitable provider brings threat intelligence AND the expertise, resources, and capabilities to minimize the impact of an attack. For example, a company fighting a DDoS attack would find its firewall is easily overwhelmed with traffic to its facility. However, a provider could scrutinize inbound traffic and divert the DDoS packets before they can hit a company’s firewall. Level 3 as your technology partner Organizations continue to build a patchwork of point solutions that are difficult to manage, create vulnerabilities, and reduce security. Level 3 offers an alternative. Level 3 network-based security relies on extensive global monitoring of network traffic and rogue systems. In particular, the Level 3 Security Operations Center monitors vii 1,000 command and control servers, more than 1 million packets per day, 350,000 alerts per day, more than 1.7 million infected machines, and more than 36 billion Netflow sessions per day. Level 3 applies analytics to this information to develop threat intelligence upon which to act. This approach helps prevent attacks in general and is especially valuable for those based on new vulnerabilities. In particular, 40 percent of the threats detected by Level 3 were previously unknown. A CPE solution based on signatures and built to block known malicious sites would miss all of those new threats. The threat intelligence Level 3 derives helps fight today’s newer types of attacks. For example, with advanced persistent threats, the activities of the hackers are stealthy and hard to detect. The command and control network traffic associated with these attacks can only be detected at the network layer level. What is required is deep log analyses and log correlation from various sources to detect the malicious activities. The high-level threat intelligence complements other Level 3 network- based security offerings. Such offerings include: • Network Based Security: Level 3’s cloud-based firewall and unified threat management (UTM) solution offers secure Internet access globally. Compared to backhauling traffic back to one or a few centralized datacenters for filtering, deploying a firewall and UTM service in the cloud can offer lower latency and reduced costs without the need for significant capital investment to deploy dedicated hardware at each site or continually update devices. • Email and Web security: Level 3 Email and Web Defense services provide comprehensive email and Web security from the cloud for companies of any size. The services block threats at the network’s edge before they impact a business. The services help companies reduce capital expenditures and effectively balance IT and security resources while providing a platform to support a growing number of users and traffic as a business expands. “CPE-based security solutions often are strained when dealing with today’s threat environment.”
6.
© 2015, QuinStreet,
Inc. Why a Network-based Security Solution is Better 5 i http://www.nytimes.com/2014/12/02/technology/hackers-target-biotech-companies.html?_r=1 ii http://www.huffingtonpost.com/2014/11/07/phishing-scams_n_6116988.html?utm_hp_ref=technology iii http://www.zdnet.com/article/zero-day-attack-barrage-in-2014-linked-to-elderwood-platform/ iv http://www.eweek.com/small-business/businesses-lack-security-knowledge-vulnerable-to-malware-threats/ v http://www.esecurityplanet.com/network-security/majority-of-enterprises-are-vulnerable-to-malware-threats.html vi https://451research.com/report-long?icid=2298 vii http://www.slideshare.net/Level3Communications/level-3-security-infographic-35525784 • DDoS mitigation: Only network- based DDoS protection solutions can provide realistic protection to company resources by quickly identifying and mitigating an attack. Level 3DDoS mitigation services cost effectively mitigate risk posed by highly sophisticated, massive DDoS attacks through the application of proven anomaly detection technology. Available as an “on-demand” or “always-on” solution and backed by proven SLAs, Level 3 DDoS Mitigation service protects against most forms of attacks. Taken together, Level 3 offers a layered defense approach to predict, detect, alert, and respond to threats against a company’s network and security infrastructure. As cyber security threats grow in number and complexity, Level 3’s combination of threat intelligence, global network visibility, broad portfolio of security services, and comprehensive 24 x 7 customer support can help efficiently and effectively manage risks to an organization’s network and data assets. To learn more about how Level 3 network-based security services and threat intelligence can protect your systems and data, visit: http://www. level3.com/en/products/managed- security-services/ “Network-based security offers threat intelligence to complement CPE solutions.”
Baixar agora