Skip to content

Cyber Security - Cyber Attack Protection

Pinterest

We're taking a new approach to counter targeted cyber attacks.

As the cyber threat environment evolves, threat protection must evolve as well. With the emergence of targeted attacks and advanced persistent threats, it is clear that a new approach to cyber security is required. Traditional techniques are simply no longer adequate to secure data against sophisticated cyber attacks.

These cyber attacks have proven their ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. The most likely targets are the companies that have corporate IP and data that offers the cyber criminals the most rewards – financial institutions, healthcare organizations, major retailers and others.

PC World reported an 81% increase in 2011 of advanced, targeted computer hacking attacks, and according to Verizon’s 2012 research findings, there were a staggering 855 cyber security incidents and 174 million compromised records.

According to the 2012 Ponemon study on the costs of cybercrime in the US for 56 large organizations, there are 1.8 successful attacks per organization per week, with the average cybercrime costing organisation about $8.9M per organisation.

Most of these cyber attacks are customised to the target organisations and include a the following features:

  • Social – Targeting and attacking specific people with social engineering and advanced malware
  • Sophisticated – Exploiting vulnerabilities, using backdoor controls, stealing and using valid credentials
  • Stealthy – Executed in a series of low profile moves that are undetectable to standard security or buried among thousands of other event logs collected every day

 

With this cyber-criminal activity rapidly on the rise, how can you take effective cyber security measures?

The ideal solution would weave your entire security infrastructure into a customised and adaptable defence approach tuned to your particular environment and particular attackers. It would enable you to not only detect and analyse these attacks, but fight back against your attackers.

Our Network Defence approach is a specialized threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications, and attacker behaviors that are invisible to standard security defenses.

Our solution runs suspect code in a safe, controlled environment that can be optimised for performance and configured to evade hacker techniques that are on the lookout for sandboxing solutions.The resulting analysis enables you to profile the risk, origin, and characteristics of the attack, and uniquely delivers actionable intelligence to help you contain and remediate the attack, then adapt and strengthen your protection against further cyber attacks.

Our solution is the only one which provides a complete lifecycle for dealing with these cyber attacks and targeted threats . In summary the solution:

  • Detects malware, communications and behavior invisible to standard defenses
  • Analyses the risk and characteristics of the attack and attacker
  • Adapts the security automatically to provide protection
  • Responds using the insight needed to counter your specific attackers

Connect with us on