slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Cognitive Security - Anatomy of Advanced Persistent Threats ('12) PowerPoint Presentation
Download Presentation
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)

Loading in 2 Seconds...

play fullscreen
1 / 35

Cognitive Security - Anatomy of Advanced Persistent Threats ('12) - PowerPoint PPT Presentation


  • 2 Views
  • Uploaded on

Check out my blog "Multiscreen & OTT for the Digital Generation" @ gdusil.wordpress.com.

“Advanced Persistent Threats”, or APTs, refers low-level attacks used collectively to launch a targeted & prolonged attack. The goal is to gain maximum control into the target organization. APTs pose serious concerns to a security management team, especially as APT toolkits become commercially and globally available. Today’s threats involve polymorphic malware and other techniques that are designed to evade traditional security measures. Best-in-class security solutions now require controls that do not rely on signature-based detection, since APTs are “signature-aware”, and designed to bypass traditional security layers. New methods are needed to combat these new threats such as Behavioral Analysis. Network Behavior Analysis proactively detects and blocks suspicious behavior before significant damage can be done by the perpetrator. This presentation provides some valuable statistics in the growing threat of APTs.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Cognitive Security - Anatomy of Advanced Persistent Threats ('12)


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript