Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Mind the gaps: A holistic approach to securing the network

Kacy Zurkus | June 11, 2015
Securing the network requires investing equitably across all IT points and recognizing that the enemy is a savvy serpent.

"A lot comes in through email users, so you need something that secures email like advanced malware protection. Users might click on an unknown threat, and that unknown needs to be addressed. Advanced malware might be able to see the file, understand its behavior and block the threat based on certain characteristics," said Solomon.

What are some technologies that can help in addition to advanced malware?

"Email security and web security on the network or the crawl ware service can reduce the time of detection and the time of response," Solomon added.

Putting in place firewalls and intrusion-prevention systems that work together are other solutions that can be in place to protect against attack vectors. "The whole security system--people, process, and security--is needed to secure your environment," he said.

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.