FEATURE: MULTI-LAYERED SECURITY
LOOK FOR THE
VENDORS THAT
INCLUDE OUTBREAK
FILTERS WITHIN THEIR
EMAIL SECURITY
ARCHITECTURE
AND CAN LEVERAGE
COLLECTIVE SECURITY
INTELLIGENCE
TO DEVELOP
PROTECTIONS IN REALTIME AGAINST NEW
OUTBREAKS
reduces false positive rates as they
serve as a check and balance against
each other. In addition, reputation
filters that look at the reputation
of the sender’s IP address can help
protect against attacks lik e snowshoe
spam that hijack IP address ranges.
2. How do you deal with blended
threats that include links to
websites laced with malware?
Look for solutions that include web
categorization and web reputation.
With web categorization security
administrators can set policies to
allow only certain categories of web
sites to be accessed. Web reputation
assigns a reputation score to a URL
based on a variety of data, including
the length of time the domain has
been malware-free, so you can set
policies about whether or not a link
can be accessed based on thresholds.
3. What happens if an attack
still gets through – do I have
any recourse? Because some
sophisticated attacks manage to
get through, you need advanced
malware protection that includes
retrospective security. Retrospective
security continues to track files and
analyse their behaviour against realtime, global threat intelligence. If a
46
INTELLIGENTCIO
file is later identified as malicious,
retrospective security can also
determine the scope of the attack so
that defenders can quickly contain
the threat and remediate.
4. What capabilities do you
offer to help me stay ahead of
emerging threats? To identify any
trend you need to have visibility into
data across a community. In this
case, the ability to look at email and
network security telemetry from a
community of users together with
other sources that track threats can
give you the intelligence and lead
time you need to proactively protect
against emerging outbreaks. Look
for vendors that include outbreak
filters within their email security
architecture and can leverage
collective security intelligence to
develop protections in real-time
against new outbreaks.
Attacks will continue to evolve as
will our IT environments. Integrated
threat defence is a dynamic
foundation that allows us to include
an expanding list of super heroes
that work in concert, sharing their
findings to protect across more
threat vectors and thwart more
attacks.
www.intelligentcio.com