Access "Threat prevention techniques: Best practices for threat management"
This article is part of the October 2012 issue of Security Readers' Choice Awards 2012: Your picks for the best security products
Staying safe on the road involves a number of controls, rules and responses. The car itself is equipped with safety features like anti-lock brakes, blind-spot warnings, seatbelts and airbags. Rules of the road include speed limits and seatbelt laws and drivers themselves must pass tests to prove they are able to operate their cars properly. No one would dream of suggesting that just because a car has airbags that it could be operated safely by a driver with no license going at 100 mph. But what appears ludicrous in the realm of safe driving can be tempting in the hectic world of IT. Can't a company just buy a single unified threat management (UTM) product with the best, most advanced threat detection technology and guarantee the organization is protected? Unfortunately, the answer is “no.” Just like driving a car requires multiple parts working together, "driving" a corporate IT network safely requires a blend of the traditional triumvirate: people, process and technology. So what goes into creating a successful threat management program? Read on to hear ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
-
The hacktivist threat to enterprise security
by Robert Westervelt, News Director
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
-
2012 Readers' Choice Awards
-
-
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
-
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
-
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
-
Columns
-
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
-
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
-
Java security problems: Is disabling Java the answer?
by Marcia Savage, Editor
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
-
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO