Security

The Gestalt Approach to IT Security Takes Shape

Download Now Free registration required

Executive Summary

Off late Enterprise IT defenses against malware or exploits are built by deploying a set of security appliances that mitigate specific threats. This appliance approach was very effective during the 1990s when dominant threats were hackers attacking corporate IT assets via the Internet. As hackers were joined by cybercriminals an economic motive to target personal data and create greater havoc materialized along with increased exploit sophistication. In fact, most of today's threats are blended, meaning that an exploit might enter a corporation through e-mail, then pass through the web which ends up having botnet traffic that eventually infects a client and phones home to a botnet server.

  • Format: PDF
  • Size: 265 KB