> White Papers > Vectra Networks > Automated threat management: No signature required

Automated threat management: No signature required

Vectra Networks

Signatures, reputation lists and blacklists are an inherently reactive approach to detecting threats. By design they only recognize threats that have been seen previously, and this means someone always needs to be the first victim.

Itís an open secret that cyber-threats are growing faster than organizations can detect them. According to the most recent Verizon Data Breach Investigation Report, in 60 percent of cases, attackers are able to compromise an organization in minutes.

Over the past several years, the information security industry has made a concerted effort to deliver signatures and rules faster and faster. The idea is to reduce the window of time from when a new threat is detected to when corresponding new signatures are delivered. This has spawned an entire market focused on aggregated security intelligence feeds.

Tags : automated threat management, signature management, data breach investigation, threat detection, threat prevention, vulnerability scanners, automated crawlers, ids, ips, malware signature, malware sandbox

* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Aug 03, 2015
Length:  6
Type:  White Paper