An Intellyx Brain Candy Brief
As software vendors get wise to popular cybersecurity attacks, they harden their offerings, pushing the attackers to come up with new attack vectors.
Today, as vendors have responded to a generation of browser exploits centering on Flash and other vulnerable technologies, the hackers have moved onto more sophisticated attacks like Internet download scams, fake apps in app stores, and malicious popup ads – among many others.
To respond to this new wave of attack vectors, SlashNext routes a carefully selected portion of all of its customers’ Internet traffic from its on-premises appliance to its cloud-based analysis back-end, where it can identify and mitigate threats in near real-time, sending the mitigation instructions back to the appliance for an automatic update.
In its cloud back-end, SlashNext essentially fools the malware into thinking it has successfully breached its target, and thus SlashNext can identify and mitigate even unknown, zero-day attacks based on their malicious behavior.
Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.
Comments