It's not easy to protect a company network, but it's not impossible

Dec 14, 2011 19:11 GMT  ·  By

The series in which we take a look at some highly important subjects discussed with Radware’s VP of Security Solutions, Carl Herberger, continues.

As I promised yesterday, we’re going to see what he said regarding the attack mitigation systems that may be crucial for companies who are looking to make sure they’re as protected as they can be.

Herberger recommends that in 2012, organizations which are looking to purchase a comprehensive security solution should first of all look for real-time protection against volumetric attacks, protection for application layer availability, and network scanning and malware propagation protections.

“Managing the security of critical information has proven a challenge for businesses and organizations of all sizes. Even companies that invest in the latest security infrastructure and tools soon discover that these technology-based ‘solutions’ are short-lived,” he said.

2011 has recorded a rise in the number of volumetric attacks, TCP, UDP, ICMP and IGMP floods being among the most common means utilized by hackers, but packet anomalies and denial of service (DoS) tools should also be regarded as threats.

When it comes to the application layer (L7) enterprises should make sure they’re protected against things such as bot-originated and direct application attacks, HTTP GET page floods, customized HTTP method attacks, HTTP uplink bandwidth consumption attacks, DNS query floods and brute force attacks.

Service cracking behavioral security measures are just as important since trusted sites are becoming more targeted by malicious activities.

“As more and more users go online to take advantage of Web 2.0 applications — like social-networking sites, blogs, and wikis — authors of ‘hacking and cracking’ software are right behind them, opening up yet another front in the constant cat-and-mouse game between security defenses and hackers,” Herberger revealed.

To combat the efficiency of the highly evolved tools utilized by hackers, signature prevention technologies can be highly useful, a fact proven by the latest cybercriminal operations that took place.

Finally, worms spreading throughout a company network can be a serious issue and that’s why the expert recommends the use of systems that permanently scan a network, at the same time preventing any malicious elements from multiplying.