Dynamic Cyber Defenses: A Fresh Approach to an Old Problem

Dynamic Cyber Defenses: A Fresh Approach to an Old Problem

RELEASE DATE
06-Apr-2018
REGION
North America
Research Code: 9B0F-00-52-00-00
SKU: IT03653-NA-SF_21844
AvailableYesPDF Download
$3,000.00
In stock
SKU
IT03653-NA-SF_21844
$3,000.00
DownloadLink
ENQUIRE NOW

Description

Dynamic defenses interact directly with attackers. By dynamically intensifying attacker interactions, dynamic defenses confirm the attacker’s purpose, clarify the threat level of each attacker session, and pragmatically contain the attacker’s activities. Operating in real-time and individually with each attacker session, the interaction and containment can last as long as the attacker engages or until the attacker is removed from compromised systems. Also, dynamic defenses are virtual. Once the attack stops, the defense concludes—no wasted resources. In the end, malicious activity is prevented from reaching and harming targeted assets, without layers of static rules.

To add color on dynamic defenses, two examples are described in this insight. The first is a cloud-based deception approach from Acalvio; and the second is a rule-less Web Application Firewall (WAF) by Threat X, also cloud-based.

Table of Contents

Introduction

Acalvio

Threat X

Stratecast - The Last Word

About Stratecast

About Frost & Sullivan

Dynamic defenses interact directly with attackers. By dynamically intensifying attacker interactions, dynamic defenses confirm the attacker’s purpose, clarify the threat level of each attacker session, and pragmatically contain the attacker’s activities. Operating in real-time and individually with each attacker session, the interaction and containment can last as long as the attacker engages or until the attacker is removed from compromised systems. Also, dynamic defenses are virtual. Once the attack stops, the defense concludes—no wasted resources. In the end, malicious activity is prevented from reaching and harming targeted assets, without layers of static rules. To add color on dynamic defenses, two examples are described in this insight. The first is a cloud-based deception approach from Acalvio; and the second is a rule-less Web Application Firewall (WAF) by Threat X, also cloud-based.
More Information
No Index No
Podcast No
Author Michael Suby
Industries Information Technology
WIP Number 9B0F-00-52-00-00
Is Prebook No
GPS Codes 3031,9455,9477,D562