{"id":646604,"date":"2013-03-13T11:30:25","date_gmt":"2013-03-13T15:30:25","guid":{"rendered":"http:\/\/www.datacenterknowledge.com\/?p=92804"},"modified":"2013-03-13T11:30:25","modified_gmt":"2013-03-13T15:30:25","slug":"defeating-cyber-threats-requires-a-wider-net","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/646604","title":{"rendered":"Defeating Cyber Threats Requires a Wider Net"},"content":{"rendered":"<p>As more organizations and users utilize the Internet, there will be more data, more management needs, and a lot of worries around security. The big push around cloud and the modern cloud-ready data center really revolves around IT consumerization and newly available resources. Just like any infrastructure, the bigger and more popular it gets \u2013 the bigger the target.<\/p>\n<p>Cyber threats have been growing and at an alarming rate. Not only have frequencies increased &#8211; the creativity of the intrusions and attacks are staggering as well. There plenty of evidence to supporting this as well:<\/p>\n<ul>\n<li><b>Malware is reaching new all-time highs <\/b>\u2013 Trend Micro, for example, has identified 145 thousand malicious Android apps, as of September 2012.2 Keeping malware at bay, already a \u201ctreading water\u201d challenge, is intensifying.<\/li>\n<li><b>BYOD is a growing threat vector<\/b> \u2013 Frost &amp; Sullivan estimates smartphones shipped in 2012 will reach 558 million, and tablets will reach 93 million. With more users using more cloud networks \u2013 targets will become larger as well.<\/li>\n<li><b>Distributed Denial of Service (DDoS) attacks are approaching mainstream<\/b> In a 2012 survey of network operators conducted by Arbor Networks, over three-quarters of the operators experienced DDoS attacks targeting their customers.<\/li>\n<li><b>Exposure footprint is expanding<\/b> \u2013According to a Frost &amp; Sullivan 2012 global survey of security professionals, slightly more than one-third of the respondents cite cloud computing as a high priority for their organizations now, and that percentage increases to 54 percent in two years.<\/li>\n<\/ul>\n<p>With the evident change in the technological landscape, there will undoubtedly be a need to re-evaluate existing security environments. Why is the case? Simple, many existing security platforms are just not enough to handle today\u2019s demands around cyber security.<a title=\"Defeating Cyber Threats Requires a Wider Net\" href=\"http:\/\/ads.madisonlogic.com\/clk?pub=81&amp;pgr=68&amp;src=4712&amp;ctg=1&amp;tstamp=20130306T215550&amp;ast=25569&amp;cmp=7565&amp;crv=0&amp;frm=293&amp;yld=0\" > In this white paper<\/a>, new types of security platforms are explored. Specifically, Arbor\u2019s ATLAS platform is seen as a leader in enterprise-ready security and traffic-monitoring. Between these two sources, Arbor is collecting data from all assigned IP addresses\u2014service-active IP addresses from Arbor platforms and service-inactive IP addresses from darknet-hosted ATLAS sensors.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"Defeating Cyber Threats Requires a Wider Net\" alt=\"Arbor\u2019s ATLAS platform \" src=\"http:\/\/s22.postimage.org\/ptw0kltgx\/arbor2.jpg\" width=\"427\" height=\"309\" \/><\/p>\n<p>Launched in 2007, ATLAS collects network traffic data from sensors hosted in carriers\u2019 darknets, and data from carrier and enterprise-deployed Arbor monitoring platforms. <a title=\"Defeating Cyber Threats Requires a Wider Net\" href=\"http:\/\/ads.madisonlogic.com\/clk?pub=81&amp;pgr=68&amp;src=4712&amp;ctg=1&amp;tstamp=20130306T215550&amp;ast=25569&amp;cmp=7565&amp;crv=0&amp;frm=293&amp;yld=0\">Download this white paper<\/a> to see how ATLAS and its platform has direct benefits for carriers and enterprises. This includes:<\/p>\n<ul>\n<li>More threats are proactively mitigated, resulting in a lower overall risk posture.<\/li>\n<li>Less remediation occurs. With fewer attacks being successful, remediation efforts will be fewer in number and smaller in scale.<\/li>\n<li>As ATLAS researchers monitor and assess traffic data from Arbor platforms and darknet sensors, carrier and enterprise security analysts gain the benefits of this threat analysis without incurring the work effort.<\/li>\n<\/ul>\n<p>Remember, the cyber threat environment will only continue to grow and evolve. Whether your environment is utilizing the WAN or some type of cloud environment \u2013 it\u2019s time to evaluate your security infrastructure and see how new, advanced, platforms can help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more organizations and users utilize the Internet, there will be more data, more management needs, and a lot of worries around security. The big push around cloud and the modern cloud-ready data center really revolves around IT consumerization and newly available resources. Just like any infrastructure, the bigger and more popular it gets \u2013 [&hellip;]<\/p>\n","protected":false},"author":7649,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-646604","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/646604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7649"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=646604"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/646604\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=646604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=646604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=646604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}