Intelligent CIO Middle East Issue 01 | Page 46

FEATURE: MULTI-LAYERED SECURITY LOOK FOR THE VENDORS THAT INCLUDE OUTBREAK FILTERS WITHIN THEIR EMAIL SECURITY ARCHITECTURE AND CAN LEVERAGE COLLECTIVE SECURITY INTELLIGENCE TO DEVELOP PROTECTIONS IN REALTIME AGAINST NEW OUTBREAKS reduces false positive rates as they serve as a check and balance against each other. In addition, reputation filters that look at the reputation of the sender’s IP address can help protect against attacks lik e snowshoe spam that hijack IP address ranges. 2. How do you deal with blended threats that include links to websites laced with malware? Look for solutions that include web categorization and web reputation. With web categorization security administrators can set policies to allow only certain categories of web sites to be accessed. Web reputation assigns a reputation score to a URL based on a variety of data, including the length of time the domain has been malware-free, so you can set policies about whether or not a link can be accessed based on thresholds. 3. What happens if an attack still gets through – do I have any recourse? Because some sophisticated attacks manage to get through, you need advanced malware protection that includes retrospective security. Retrospective security continues to track files and analyse their behaviour against realtime, global threat intelligence. If a 46 INTELLIGENTCIO file is later identified as malicious, retrospective security can also determine the scope of the attack so that defenders can quickly contain the threat and remediate. 4. What capabilities do you offer to help me stay ahead of emerging threats? To identify any trend you need to have visibility into data across a community. In this case, the ability to look at email and network security telemetry from a community of users together with other sources that track threats can give you the intelligence and lead time you need to proactively protect against emerging outbreaks. Look for vendors that include outbreak filters within their email security architecture and can leverage collective security intelligence to develop protections in real-time against new outbreaks. Attacks will continue to evolve as will our IT environments. Integrated threat defence is a dynamic foundation that allows us to include an expanding list of super heroes that work in concert, sharing their findings to protect across more threat vectors and thwart more attacks. www.intelligentcio.com