Solved

APT evaluation

Posted on 2016-08-11
2
17 Views
Last Modified: 2016-08-12
I would like to know if any good Advanced Persistent Threat benchmark for evaluating/rating the APT appliances from different vendor, e.g. the functions that an APT should have, and the performance that it should attain...

Thanks.
0
Comment
Question by:kwlol
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41753374
You should be checking out the breach detection assessment from NSS Lab (https://www.nsslabs.com/company/news/press-releases/nss-labs-announces-results-from-breach-detection-systems-test/) and Gartner advices the "Five Styles of Advanced Threat Defense" (http://www.gartner.com/newsroom/id/2595015)
This can help in soliciting from the provider on the capability and some of them are highlighted in the Gartner assessment mentioned above.

To quote I see as a whole for line of defence to be build and not rely on single appliance or system to prevent, deter, detect and response to such APT. Large part is the endpoint (as last line of defence) and user awareness (to close up low hanging fruit) and vigilance to complement the APT protection strategy
To thwart the advanced attacks that are successfully penetrating their defenses, organizations need next-generation threat protection that is signature-less with dynamic code execution to detect the unknown.
http://latonetworks.com/media/41539/why_ngfws_dont_stop_malware_wp_f.pdf
0
 

Author Closing Comment

by:kwlol
ID: 41753700
Thanks
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Delete data for good so it cannot be retrieved from the hard drive. 19 494
Valid certifications 2 421
Network Traffic Monitoring/forensics 2 748
Measures against hacking of websites 3 446
So, a cyberiminal’s ultimate goal and motivation has to involve financial gain, right?—not necessarily. There are at least five other motivations behind cybercriminal activities.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question