Rzut oka na środowisko sandbox

W przypadku komputerów termin sandbox był stosowany od dawna jako nazwa bezpiecznego, odizolowanego środowiska, w którym złośliwy kod może być uruchamiany i poddawany analizom. Koncepcja ta znajduje obecnie zastosowanie w zabezpieczeniach sieciowych, umożliwiając transmisję i badanie ruchu sieciowego w celu wykrycia złośliwego kodu, który poprzednio prześliznąłby się przez tradycyjne zabezpieczenia.
Get Whitepaper

Fortinet: Infrastruktura Advanced Threat Protection

W latach 2013–2014 o znaczących markach i dużych firmach słyszeliśmy nie w kontekście sukcesów związanych z odzyskiwaniem równowagi po kryzysie gospodarczym czy premier innowacyjnych produktów, lecz z powodu wielokrotnych naruszeń bezpieczeństwa danych. Ponad 100 milionów klientów padło ofiarami kradzieży danych osobowych i/lub kart kredytowych podczas tylko jednego z tych zuchwałych i zakrojonych na szeroką skalę ataków.
Get Whitepaper

Bei der Bekämpfung moderner, komplexer Angriffe als Unternehmen handlungsfähig bleiben

Das Konzept moderner, hoch entwickelter Angriffe, auch Advanced Persistent Threats (APT oder komplexe persistente Bedrohungen) genannt, hat sich in den Sprachgebrauch und das kollektive Denken der IT eingebrannt. Beflügelt durch Nachrichten von ständig neuen Datendiebstählen bekommen komplexe, persistente Bedrohungen den Nimbus des Mythischen, werden aber dennoch größtenteils verkannt. Lange ging man davon aus, dass komplexe, persistente Bedrohungen für alle Datendiebstähle verantwortlich seien, auch dann, wenn nachfolgende Untersuchungen ergaben, dass eigentlich menschliches Versagen oder eine mangelhafte Netzwerkarchitektur das Eindringen ins Netzwerk ermöglicht haben.
Get Whitepaper

Head-First Into The Sandbox

In computers, the term sandboxing has long been used to represent a safe, isolated environment in which to run malicious code so researchers can analyze it. The same concept is now being applied by network security appliances to execute and inspect network traffic, uncovering malicious code that would previously slip past traditional security measures.
Get Whitepaper

Simple and Secure

This white paper explains why companies need secure enterprise file sync and share (EFSS) solutions, how users can work with them, and which capabilities an EFSS product should have. Last but not least, the white paper also looks at the extent to which Brainloop Dox, a new EFSS product, corresponds to user requirements.
Get Whitepaper

DDoS Attack Interceptor

Your business is increasingly reliant on digital content and a 24x7 online presence. Any disruption can have serious consequences to your reputation, operations, and bottom line. Yet the pace, scale, and sophistication of attacks targeting online resources is constantly increasing—and requires multiple lines of defense. Limelight’s DDoS Attack Interceptor is a comprehensive, multi-layer solution that offers protection from even the largest and most complex Distributed Denial of Service (DDoS) attacks before they can wreak havoc on your business.
Get Whitepaper

Trust Online is at the Breaking Point

Most alarming threat to security professional in 2015 is a Cryptoapocalypse: a discovered cryptographic weakness that becomes the ultimate weapon, allowing websites, payment transactions, stock trades, and government to be spoofed or surveilled (term was coined by researches presenting their findings at Black Hat 2013).
Get Whitepaper

Eliminate Blind Spots in SSL Encrypted Traffic

Many security systems now perform high speed SSL/TLS decryption. But these systems cannot decrypt traffic if they don’t have access to keys and certificates. To eliminate blind spots in encrypted traffic, you need to secure your keys and certificates. Otherwise, your other security controls become less effective and leave the door open to cybercriminals.
Get Whitepaper

Stop Unauthorized Privileged Access

SSH is a cryptographic security protocol used to connect administrators and machines. While SSH keys are often used to secure access to the most sensitive systems and data, there is usually little awareness or policy enforcement in place around their use. If you don’t know which administrator or SSH key has access to which servers, your IT environment may already be at risk.
Get Whitepaper

Failure to Protect Keys and Certificates Undermines Critical Security Controls

Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Get Whitepaper

2015 Cost of Cyber Crime Study: Brazil

Discover how enterprise security solutions can help you address the core systems and business process-related activities that drive a range of expenditures associated with a company’s response to cyber crime.

The cost framework for cyber crime includes:

• The costs related to dealing with the cyber crime (internal cost activity centers): detection, investigation and escalation, containment, recovery and ex-post response.
• The costs related to the consequences of the cyber attack (external consequences and costs): information loss or theft, business disruption, equipment damage, and revenue loss.

Get Whitepaper

2015 Cost of Cyber Crime Study: Global

Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.

There is significant variation in total cyber-crime costs among participating companies. The US sample reports the highest total average cost at $15 million and the Russian sample reports the lowest total average cost at $2.4 million. It is also interesting to note that Germany, Japan, Australia and Russia experienced a slight decrease in the cost of cyber-crime over the past year. The percentage net change between FY 2015 and FY 2014 is 1.9 percent.

Learn more and draw important conclusions for the safety of your organization.

Get Whitepaper

2015 Cost of Cyber Crime Study: Russian Federation

Discover how enterprise security and intelligence solutions can influence the safety of your long term business goals by limiting the costs of cyber-attacks.

This reports show you a positive relationship between the time to contain an attack and organizational cost. The average time to resolve a cyber-attack was 32 days, with an average cost to participating organizations of RUB 14.2 million during this 32-day period. Results show that malicious insider attacks can take approximately 57 days on average to contain. Learn more and draw important conclusions for the safety of your organization.

Get Whitepaper

2015 Cost of Cyber Crime Study: Germany

Discover how your enterprise security expenditures can be affected by cyber crime attacks and how you can prepare your organization to properly address these issues.

The 5 internal cost activities include:

• Detection: Enabling an organization to reasonably detect cyber attacks.
• Investigation and escalation: Activities necessary to uncover the source, scope, and magnitude of incidents.
• Containment: Activities that focus on stopping the severity of cyber threats.
• Recovery: Repairing and remediating business process activities.
• Ex-post response: How to minimize potential future attacks.

Get Whitepaper

2015 Cost of Cyber Crime Study: Japan

Discover how you can improve your enterprise security by better understanding the cost of cyber crime. It can help you determine the appropriate amount of investment and resources needed to prevent or mitigate the consequences of a cyber attack.

The number of cyber attacks against Japanese companies continues to grow in frequency and severity. This year, cyber attacks successfully targeted various universities including Ehime University, the University of Yamanashi, Fukuoka University and others. SMBC Nikko Securities, Inc. also suffered an attack that disrupted access to its web services.

Get Whitepaper