Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Alert Logic > Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
 

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager

White Paper Published By: Alert Logic
Alert Logic
Published:  Jun 12, 2014
Type:  White Paper
Length:  5 pages

New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. In response, the array of security technologies available has also grown. While we are familiar with essential defenses such as network firewalls and antivirus software, more sophisticated solutions are harder to evaluate. Intrusion detection, SIEM, Web application firewalls—which are right for your organization, and how do they work together to prevent data breaches, downtime and the business consequences of a successful attack? In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets. We will do so in the context of the Vulnerability Life Cycle—a model to understand how attackers find and leverage vulnerabilities to attack their targets. In doing so, we will provide insight into how you can use these different technologies to identify attacks, prevent them and recognize and re mediate successful attacks.



Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management