One of the biggest concerns that confront large and small enterprises alike is what is known as Advanced Persistent Threats (APT). An APT is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. Unlike the basic or mass market threats that everyone should be blocking, APTs are unknown threats that cannot be detected by traditional signature-based defences such as firewalls, IPSs, and secure web and email gateways.
According to a recently released report by Verizon, in the year 2013, 92% of data- breaches were perpetrated by outsiders while 84% of attackers were able to compromise their targets in seconds, minutes or hours, however 78% of data-breach incidents took weeks, months or years to discover. This leaves a significant window that is used by the attackers leaving the organisations vulnerable during this period which can be more than years.
APTs have both the capability and the intent to persistently and effectively target a specific entity. The motive behind such threats is to steal confidential data and information from a specific person. For instance, this person could be an employee of a large organization be it a bank or a government body. APT attacks target organizations in sectors with high-value information, such as National defense, aerospace, oil and gas, manufacturing, banking, financial services, and insurance among others.
While you don't know how the APT against your company is working, a detection process require a deep analisys and correlation of suspicious events in your IT infrastructures.
To do this, CloudWALL Italia offers an innovative event and incident management in the cloud, able to help you in analyzing and correlating events to detect incidents and suspicious activities.
CloudWALL LOG | Event Log Management is the enterprise service that enables you to gain insights from your data without having to wait for hardware or staffing resources. Use CloudWALL LOG to prevent outages, troubleshoot problems and investigate security incidents, in real time. Do all of this regardless of where your data is generated.
Find more details at
www.cloudwall.tk/log .