Access your Pro+ Content below.
Threat prevention techniques: Best practices for threat management
This article is part of the Information Security magazine issue of October 2012
Staying safe on the road involves a number of controls, rules and responses. The car itself is equipped with safety features like anti-lock brakes, blind-spot warnings, seatbelts and airbags. Rules of the road include speed limits and seatbelt laws and drivers themselves must pass tests to prove they are able to operate their cars properly. No one would dream of suggesting that just because a car has airbags that it could be operated safely by a driver with no license going at 100 mph. But what appears ludicrous in the realm of safe driving can be tempting in the hectic world of IT. Can't a company just buy a single unified threat management (UTM) product with the best, most advanced threat detection technology and guarantee the organization is protected? Unfortunately, the answer is “no.” Just like driving a car requires multiple parts working together, "driving" a corporate IT network safely requires a blend of the traditional triumvirate: people, process and technology. So what goes into creating a successful threat ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
A successful threat management program requires effective processes, layered technology and user education.
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
Security researchers are finding more malware that attacks multiple operating systems.
Columns in this issue
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.