Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Intel Security > The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)
 

The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)

White Paper Published By: Intel Security
Intel Security
Published:  Jan 20, 2015
Type:  White Paper
Length:  8 pages

Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.



Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security