Cloud protection, remote browser can minimise cyber breach

Image
IANS Mumbai
Last Updated : Jun 14 2017 | 4:28 PM IST

At a time when the level of cyber security threat to enterprise IT continues to be alarming, Cloud workload protection platforms (CWPP) and remote browser technologies can protect or thwart such breaches, market research firm Gartner said on Wednesday.

According to Gartner, hybrid CWPP provide information security leaders with an integrated way to protect workloads using a single management console and a single way to express security policy.

"As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks," said Gartner Vice President Neil MacDonald in a statement.

"Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as Cloud, mobile and DevOps," MacDonald added.

Almost all successful attacks originate from the public internet and browser-based attacks are the leading source of attacks on users. By isolating the browsing function, malware is kept off of the end-user's system.

The market research firm also identified 'deception' technologies to thwart cyber attacks.

Deception is defined by the use of deceits, decoys or tricks designed to throw off an attacker's cognitive processes or disrupt an attacker's automation tools.

"By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defences with a high level of confidence in the events detected," Gartner noted.

According to Gartner, by 2020, 80 per cent of large enterprises, 25 per cent of mid-size organisations and 10 per cent of small organisations will have invested in endpoint detection and response (EDR) capabilities.

EDR solutions monitor endpoints for indications of unusual behaviour and activities indicative of malicious intent.

Among other technologies that thwart, delay or identify the potential breaches or cyber attacks are network traffic analysis (NTA) managed detection and response (MDR) and microsegmentation.

--IANS

qd/na/dg

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Jun 14 2017 | 4:18 PM IST

Next Story