Premium Content

Access "Feature: Enhanced threat detection: The next (front) tier in security"

John Pirc Published: 25 Nov 2013

Threat detection has moved beyond signature-based firewalls and intrusion detection systems to include newer technologies that monitor content and communications. These tier-two technologies are not included in security budgets, however, for many reasons. The primary one: These newer systems and services -- security intelligence, threat forecasting and modeling, breach detection systems, forensics -- are excluded due to a myopic focus on conventional best practices or outdated regulatory compliance. Security at the highest level can be broken down to people, process and technology. The people and process requirements are going to be different depending on company revenue, industry vertical and geographic location. However, security technology and threat detection, for the most part, have remained relatively consistent and static across most industry verticals, with the inclusion of tier-one security technologies. These technologies are considered the foundation of security best practices: firewalls, antivirus, intrusion detection/prevention systems, secure ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...