Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

10 Security Predictions For 2012

CRN looks into its crystal ball and sees Android, hactivisim and cyber-espionage as some of the top 10 security threats in 2012.

Back 1   2   3   ... 11 Next

photo
10. Emerging Technology



A technology trend that will gather steam in 2012 is the management and analysis of logs from hardware and software on the corporate network. Such data can provide evidence of malware, giving IT departments a chance to quickly neutralize the threat. Undervalued in the past, log analysis is being included in security vendor products, as customers begin to understand how such information can be used to thwart an attack. Vendors specializing in the field include Tripwire, LogLogic and Logrhythm, which CRN named as a "Need To Know: Emerging Security Vendor" in 2011. Driving the need for security-related log management is the rise in advanced persistent threats (APT). Attackers using such methods target specific companies with sophisticated malware designed to operate unnoticed in infected systems.

 
 
Back 1   2   3   ... 11 Next

sponsored resources