Network Monitoring and Analysis Blog

Monday, 12 December 2011 15:52

Lancope Announces Top 5 Security Predicitions for 2012

Lancope Announces Top 5 Security Predicitions for 2012

Advanced persistent threats and insider threats expected to increase; industrialized attacks and employee misuse and abuse also remain top security concerns

ATLANTA, Dec. 12, 2011 – Lancope, Inc., a leader in flow-based security, network and application performance monitoring, today unveiled its top five security predictions for 2012. The predictions highlight the most prominent types of security threats that are expected in 2012, and explain how the risk associated with these threats will evolve.

Organizations witnessed an explosion of high-profile breaches and cyber attacks in 2011 – including the highly publicized WikiLeaks breach and Anonymous and LulzSec attacks. This steady stream of directed attacks will continue, if not increase, in 2012.

Lancope’s top five security predictions for 2012 include:

1.    Advanced persistent threats (APTs) will become more predominant - The explosion of APTs, also known as targeted attacks, against high-profile companies and government agencies in 2011 will become even more predominant in 2012. Organizations that come under fire from APTs will be at heightened risk, suffering tremendous credibility and financial loss.

2.    Insider threats will grow - Insider threats backed by malicious intent, and the risks associated with insider breaches, will grow in 2012. Because they occur within the network and by privileged users such as employees, contractors or partners, organizations will have a hard time battling insider threats with traditional security measures that detect attacks from the outside.

3.    Industrialized attacks will remain stable - Industrialized attacks have been around for several years now, but they no longer represent the peak of sophistication in the world of cyber threats. They will, however, continue to be a viable concern in 2012 due to their profitability. In 2012, industrialized attackers will focus efforts on “soft targets,” or organizations without tight security.

4.    Employee misuse and abuse will create steady risk - Employee misuse and abuse is a problem that is not going away anytime soon, as employees are increasingly seeking ways to use their personal devices and other computing conveniences in the workplace. For the most part, employee misuse and abuse incidents won’t be backed by malicious intent. They can, however, open the corporate network up to attack, so they should be considered a fairly high risk in 2012.

5.    Fully automated attacks will trend down - “Drive-by” automated attacks, or traditional viruses and worms, have been trending down in recent years, and they will continue to do so in 2012. The primary concern with automated, indiscriminate attacks will continue to be business downtime and loss of worker productivity.

“If 2011 taught us anything, it’s that the targeted, highly motivated attacker is real. Tomorrow’s threat landscape requires a new level of preparation when it comes to security,” said Adam Powers, chief technology officer at Lancope. “Security solutions that only block attacks at the perimeter are no longer enough. Instead, organizations should rely on solutions that provide visibility into the internal network, uncovering both external attacks that bypass perimeter defenses as well as dangerous insider activities.”

Enterprise-ready flow collection and analysis solutions like Lancope’s StealthWatch® System deliver the situational awareness needed to bolster risk posture and combat advanced security threats. Not relying on signature updates to detect attacks, StealthWatch uncovers both zero-day attacks that bypass perimeter defenses, as well as internal threats such as network misconfiguration, policy violations and data leakage. Advanced capabilities including application and identity awareness, as well as automated threat prioritization and mitigation, further enhance incident response efforts.

To learn more about the 2012 security threat landscape, register for Lancope’s complimentary webinar, “The 2012 Network Security Landscape – How NetFlow Can Help,” which will take place on Thursday, December 15, at 11:00 a.m. ET: http://www.lancope.com/news-events/webinars/2012-net-sec-landscape/.

 

Related Solutions

  • packet visibility in the cloud

    You hold a responsibility in the design or implementation of monitoring and/or security solutions in a network environment. And the network and application are being virtualized in a private- or pubic cloud environment. This causes a challenge in getting the right packets to right tools. In the traditional world you relied on span ports, taps and packet brokers but how will this work in a virtual environment?
  • Weet u welke apparaten er exact in uw netwerk zich bevinden? De OptiView-XG wel!

    Netwerken worden vandaag de dag steeds complexer en uitgebreider. Documentatie van al die wijzigingen is voor veel netwerkadministrators helaas nog altijd een ondergeschoven kindje. Tel daarbij op dat het uw taak is om dergelijke complexe netwerken te audit'en. Fluke Networks heeft met de introductie van de OptiView-XG Network Analysis Tablet daar een oplossing voor gemaakt. Één tablet, die u inzicht geeft wat er zich allemaal afspeelt op het netwerk.

     

     

  • Solve application performance problems

    You are faced with a growing number of question and complaints from users about applications on your network. And these questions and complaints are getting more and more complex to solve. Application-centric analysis software gives you quick answers to application performance problems.

  • Quickly visualize and troubleshoot your IT environment

    Your network environment holds an ever growing number of users and applications that are all under your responsibility. And the networks users put you in charge of fixing any application or network issues they might experience. So want have the fastest way to see the root cause of any issue.

Supplier

  • Lancope

    Lancope is the leader in NetFlow collection and analysis and the provider of StealthWatch for flow-based network performance and security monitoring for enterprise networks. StealthWatch delivers unmatched scalability, best-in-class problem resolution work flow, and the industry's only unified platform for managing network, security and virtual operations.

Related Blog messages

  • Bescherming van persoonsgegevens tijdens monitoring

    De boetes liegen er niet om: vier procent van de omzet met een maximum van twintig miljoen euro. En de raad van bestuur is hoofdelijk aansprakelijk. Met een Autoriteit Persoonsgegevens, die straks streng gaat handhaven, hebben we het hier niet over bangmakerij. Hoe zorg je ervoor dat de kans op een boete of reputatieschade tot het minimum beperkt wordt? Door de bescherming van persoonsgegevens tot prioriteit nummer één te maken. De burger/patiënt/consument staat in de GDPR namelijk centraal.

    Netwerk monitoring zal ook aan deze norm moeten voldoen. NETSCOUT® monitoring and security solutions, met in het bijzonder nGenius® Packet Flow System (PFS) zorgt ervoor dat er zichtbaarheid (visibility) ontstaat voor bedrijven, die voldoet aan de regelgeving, of dit nu cloud- , hybride- of lokale netwerken zijn is om het even.

  • HL7 monitoring with nGenius One

    Op het gebied van ICT innovatie en volwassenheid worden grote stappen gemaakt door zorg organisaties als we kijken naar een steeds meer centrale benadering van zorg verlenen. Snel en veilig op een kosten efficiënte manier interactie maken met het elektronisch patiënten dossier (EPD), imaging services (DICOM) en diagnostische testresultaten bestemd voor de specialisten en/of communicatie met patiënten behoren in de zorg tot de dagelijkse activiteiten.
  • Citrix XenApp monitoring

    NETSCOUT is een partner van Citrix en biedt met hun Real-time layer 2-7 monitoring van XenApp, XenDesktop en NetScaler, de juiste oplossing om problemen rondom Citrix omgevingen snel en adequaat te onderzoeken. Het nGeniusOne Service Assurance Platform biedt zeer uitgebreid inzicht in de performancekarakteristieken van alle applicaties die via een Citrix omgeving geleverd worden, maar ook van de Citrix resources, waardoor exact wordt aangeven waar eventuele service degradaties optreden. Ook binnen een virtuele omgeving is dit mogelijk door middel van virtuele probes.
  • Network visibility for dummies

    Bij het ontwerpen van enterprise security omgeving gaat de aandacht vaak uit naar de mogelijkheden en functies van security- en monitoring applicaties. Maar net zo belangrijk is het om deze tools van het juiste netwerkverkeer te voorzien. Want je kunt je allen beveiligen tegen wat je ziet. Dit E-book beschrijft hoe je een effectieve security architectuur voor je netwerk bouwt.