Homepage This page's url is: -crn- Rankings and Research Companies CRNtv Events WOTC Jobs Tech Provider Zone

10 Security Predictions For 2012

CRN looks into its crystal ball and sees Android, hactivisim and cyber-espionage as some of the top 10 security threats in 2012.

Back 1   2   3   ... 11 Next

10. Emerging Technology

A technology trend that will gather steam in 2012 is the management and analysis of logs from hardware and software on the corporate network. Such data can provide evidence of malware, giving IT departments a chance to quickly neutralize the threat. Undervalued in the past, log analysis is being included in security vendor products, as customers begin to understand how such information can be used to thwart an attack. Vendors specializing in the field include Tripwire, LogLogic and Logrhythm, which CRN named as a "Need To Know: Emerging Security Vendor" in 2011. Driving the need for security-related log management is the rise in advanced persistent threats (APT). Attackers using such methods target specific companies with sophisticated malware designed to operate unnoticed in infected systems.

Back 1   2   3   ... 11 Next

sponsored resources