International. Comstor notes that a modern security strategy requires protection of endpoints or vulnerabilities and potential targets from malware creators.
Much of the threats that reach corporations through endpoints are made through e-mails with malware, infected websites, mobile devices and other increasingly complex techniques used by cybercriminals. This situation shows that this point, quite vulnerable, was underestimated by the protection approach.
Microsegmentation used network-based solutions, but endpoints in that context, became an area of great exposure, as more and more users connect to corporate networks from the most diverse devices and using the most varied applications.
McAfee Labs' threat report for the first quarter of 2016 revealed impressive data: Nearly 500,000 attempts to connect to untrusted IP addresses happen every hour. In that same time period, more than 1.8 million potentially unwanted programs attempt to install or start and more than 4.3 million attempts to induce users to visit untrusted URLs.
Therefore, it is increasingly difficult for businesses to have that network perimeter protection with so many mobile devices and applications connecting to their networks. If a malware has cryptography, it passes imperceptibly through a firewall detection, if it enters the network, there will be no more filters in that so-called east-west traffic. What can be done is that current search of the IT security sectors, and make security controls and risk minimization technologies closer to data and access control.
Leave your comment