By Mathew J. Schwartz
November 16, 2010
What happens after a data breach, criminals attack the enterprise
network, or PCs get infected with a virus via Facebook, leading to
network downtime? According to a new survey: confusion. That's because
two-thirds of organizations lack the right data or tools to fully
understand the scope of a security incident, and 35% lack a response
Those findings come from a new survey conducted by Trusted Strategies
for Solera Networks, which sells network monitoring tools. The study
queried more than 200 security professionals about their organization's
ability to detect and deal with advanced, persistent threats. Such
threats often use combinations of attacks to sneak past existing
"We have seen a shift in the type of threats organizations are having to
deal with," said Peter Schlampp, VP of marketing and product management
at Solera Networks, in a statement. "Opportunistic theft and vandalism
on networks is being replaced with targeted, multi-component, persistent
attacks focused on specific systems and assets. Results of the study
clearly show that most organizations are ill prepared to prevent and
respond to these incidents."
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery
Network, Cisco Switches, SAS 70 Type II Datacenter.
Find peace of mind, Defend your Critical Infrastructure.