- Whitepapers/Studies (39)
Threats against computer systems are more than a quarter century old, yet new and complex attacks by hackers continue to wreak havoc on todayâ€™s connected corporations. For more than two decades, firewall technologyâ€”and more recently point solutions such as virus detection and prevention, encryption and patch managementâ€”have helped to protect corporate information assets from computer criminals. However, with todayâ€™s blended attacksâ€”computer network attacks that seek to maximize the severity of damage by combining multiple threat methodâ€”these point solutions are no longer sufficient as protective layers. In fact, as the complexity of protective layers increases, new threats become more challenging to defend against as hackers exploit all of the existing protective layers in a blended front. In addition, new targets are continually becoming available as emerging technologies, such as VoIP, become ubiquitous amongst organizationâ€™s networks. Simple Internet services such as Web access, instant messaging and peer-to-peer file sharing networks (such as Kazaa), already notorious for consuming bandwidth and potentially reducing employee productivity, open up potential security holes.