Research Library > Vectra Networks > Automated threat management: No signature required

Automated threat management: No signature required

Published By: Vectra Networks
Vectra Networks
Published:  Aug 03, 2015
Length:  6 pages

Signatures, reputation lists and blacklists are an inherently reactive approach to detecting threats. By design they only recognize threats that have been seen previously, and this means someone always needs to be the first victim.

Itís an open secret that cyber-threats are growing faster than organizations can detect them. According to the most recent Verizon Data Breach Investigation Report, in 60 percent of cases, attackers are able to compromise an organization in minutes.

Over the past several years, the information security industry has made a concerted effort to deliver signatures and rules faster and faster. The idea is to reduce the window of time from when a new threat is detected to when corresponding new signatures are delivered. This has spawned an entire market focused on aggregated security intelligence feeds.



Tagsautomated threat management, signature management, data breach investigation, threat detection, threat prevention, vulnerability scanners, automated crawlers, ids