Protecting against undefined exploits and security threats

Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

Such attacks represent an increasing risk to an enterprise, as information is compromised or floods of malicious traffic clog networks and bring mission-critical business systems, processes and procedures to a standstill.

There is a wealth of tools available to help protect the enterprise from security threats. Firewalls, virtual private networks, strong user authentication, encryption, intrusion detection/prevention systems (IDS/IPS), email filters, antivirus, vulnerability scanners are all options. Each of these point solutions is capable of addressing a specific element of the security mosaic. In order to address their limitations many enterprises attempt to aggregate these solutions in a futile attempt to achieve effective IT security.
Security Park - Protecting against undefined exploits and security threats

Linked by shanmuga Friday, 23rd December 2005 11:49PM