Network Monitoring and Analysis Blog

Monday, 12 December 2011 15:52

Lancope Announces Top 5 Security Predicitions for 2012

Lancope Announces Top 5 Security Predicitions for 2012

Advanced persistent threats and insider threats expected to increase; industrialized attacks and employee misuse and abuse also remain top security concerns

ATLANTA, Dec. 12, 2011 – Lancope, Inc., a leader in flow-based security, network and application performance monitoring, today unveiled its top five security predictions for 2012. The predictions highlight the most prominent types of security threats that are expected in 2012, and explain how the risk associated with these threats will evolve.

Organizations witnessed an explosion of high-profile breaches and cyber attacks in 2011 – including the highly publicized WikiLeaks breach and Anonymous and LulzSec attacks. This steady stream of directed attacks will continue, if not increase, in 2012.

Lancope’s top five security predictions for 2012 include:

1.    Advanced persistent threats (APTs) will become more predominant - The explosion of APTs, also known as targeted attacks, against high-profile companies and government agencies in 2011 will become even more predominant in 2012. Organizations that come under fire from APTs will be at heightened risk, suffering tremendous credibility and financial loss.

2.    Insider threats will grow - Insider threats backed by malicious intent, and the risks associated with insider breaches, will grow in 2012. Because they occur within the network and by privileged users such as employees, contractors or partners, organizations will have a hard time battling insider threats with traditional security measures that detect attacks from the outside.

3.    Industrialized attacks will remain stable - Industrialized attacks have been around for several years now, but they no longer represent the peak of sophistication in the world of cyber threats. They will, however, continue to be a viable concern in 2012 due to their profitability. In 2012, industrialized attackers will focus efforts on “soft targets,” or organizations without tight security.

4.    Employee misuse and abuse will create steady risk - Employee misuse and abuse is a problem that is not going away anytime soon, as employees are increasingly seeking ways to use their personal devices and other computing conveniences in the workplace. For the most part, employee misuse and abuse incidents won’t be backed by malicious intent. They can, however, open the corporate network up to attack, so they should be considered a fairly high risk in 2012.

5.    Fully automated attacks will trend down - “Drive-by” automated attacks, or traditional viruses and worms, have been trending down in recent years, and they will continue to do so in 2012. The primary concern with automated, indiscriminate attacks will continue to be business downtime and loss of worker productivity.

“If 2011 taught us anything, it’s that the targeted, highly motivated attacker is real. Tomorrow’s threat landscape requires a new level of preparation when it comes to security,” said Adam Powers, chief technology officer at Lancope. “Security solutions that only block attacks at the perimeter are no longer enough. Instead, organizations should rely on solutions that provide visibility into the internal network, uncovering both external attacks that bypass perimeter defenses as well as dangerous insider activities.”

Enterprise-ready flow collection and analysis solutions like Lancope’s StealthWatch® System deliver the situational awareness needed to bolster risk posture and combat advanced security threats. Not relying on signature updates to detect attacks, StealthWatch uncovers both zero-day attacks that bypass perimeter defenses, as well as internal threats such as network misconfiguration, policy violations and data leakage. Advanced capabilities including application and identity awareness, as well as automated threat prioritization and mitigation, further enhance incident response efforts.

To learn more about the 2012 security threat landscape, register for Lancope’s complimentary webinar, “The 2012 Network Security Landscape – How NetFlow Can Help,” which will take place on Thursday, December 15, at 11:00 a.m. ET:


Related Solutions

  • FX150+ OTDR VeEX

    Featuring up to 256,000 Data Points and 3 cm resolution, the new enhanced FX150+ mini OTDR from VeEX offers superior measurement accuracy for installation, maintenance and troubleshooting of FTTx, Mobile FrontHaul/BackHaul and Metro fiber networks. The compact, lightweight platform incorporates power meter, light source, fiber inspection probe and VFL test options which add exceptional versatility to the unit.

  • WiFi Troubleshooting with full spectrum analyzer

    The WX150 test set is a compact and lightweight addition to the WiFi Air Expert family. It provides all the tools necessary for WiFi networks discovery, survey, optimization, performance testing and troubleshooting in a compact form factor.

  • packet visibility in the cloud

    You hold a responsibility in the design or implementation of monitoring and/or security solutions in a network environment. And the network and application are being virtualized in a private- or pubic cloud environment. This causes a challenge in getting the right packets to right tools. In the traditional world you relied on span ports, taps and packet brokers but how will this work in a virtual environment?
  • Weet u welke apparaten er exact in uw netwerk zich bevinden? De OptiView-XG wel!

    Netwerken worden vandaag de dag steeds complexer en uitgebreider. Documentatie van al die wijzigingen is voor veel netwerkadministrators helaas nog altijd een ondergeschoven kindje. Tel daarbij op dat het uw taak is om dergelijke complexe netwerken te audit'en. Fluke Networks heeft met de introductie van de OptiView-XG Network Analysis Tablet daar een oplossing voor gemaakt. Één tablet, die u inzicht geeft wat er zich allemaal afspeelt op het netwerk.



  • Solve application performance problems

    You are faced with a growing number of question and complaints from users about applications on your network. And these questions and complaints are getting more and more complex to solve. Application-centric analysis software gives you quick answers to application performance problems.


  • Cisco Stealthwatch

    Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you’ll always know who is on your network and what they are doing.

    A single, agentless solution allows visibility across the extended network, including endpoints, branch, data center, and cloud. And with Encrypted Traffic Analytics, Cisco Stealthwatch is the only product that can detect malware in encrypted traffic and ensure policy compliance, without decryption.

Related Blog messages

  • IXIA BeNeLux partner training

    IXIA Benelux Partner Support. In dept technical training at Heynen offices. Getting to know all aspects from IXIA Network Packet Brokers, Taps, Bypass switches providing single pane of glass for Deep dive in Testing Solutions for IP Networks, Network Security, VOIP, VOLTE, VoWiFi, NFV, SDN, SD-WAN, EPC, vEPC, IMS, 3G+4G+5G,
  • IXIA Cloudlens Delivery

    A large number of Ixia Cloudlens Network Packet Prokers are delivered into Belgium end of December 2017. These will provide full network visibility across the public, private, and hybrid clouds from an undisclosed tier one customer. Both IXIA and Heynen are looking forward to support this important project.
  • Bescherming van persoonsgegevens tijdens monitoring

    De boetes liegen er niet om: vier procent van de omzet met een maximum van twintig miljoen euro. En de raad van bestuur is hoofdelijk aansprakelijk. Met een Autoriteit Persoonsgegevens, die straks streng gaat handhaven, hebben we het hier niet over bangmakerij. Hoe zorg je ervoor dat de kans op een boete of reputatieschade tot het minimum beperkt wordt? Door de bescherming van persoonsgegevens tot prioriteit nummer één te maken. De burger/patiënt/consument staat in de GDPR namelijk centraal.

    Netwerk monitoring zal ook aan deze norm moeten voldoen. NETSCOUT® monitoring and security solutions, met in het bijzonder nGenius® Packet Flow System (PFS) zorgt ervoor dat er zichtbaarheid (visibility) ontstaat voor bedrijven, die voldoet aan de regelgeving, of dit nu cloud- , hybride- of lokale netwerken zijn is om het even.

  • HL7 monitoring with nGenius One

    Op het gebied van ICT innovatie en volwassenheid worden grote stappen gemaakt door zorg organisaties als we kijken naar een steeds meer centrale benadering van zorg verlenen. Snel en veilig op een kosten efficiënte manier interactie maken met het elektronisch patiënten dossier (EPD), imaging services (DICOM) en diagnostische testresultaten bestemd voor de specialisten en/of communicatie met patiënten behoren in de zorg tot de dagelijkse activiteiten.