Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • PM Modi in Manipur
  • Charlie Kirk killer
  • Sushila Karki
  • IND vs PAK
  • India-US ties
  • New human organ
  • Downton Abbey: The Grand Finale Movie Review
fp-logo
45% Cos Fear More Complex Attacks On Their IT Infrastructures
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • 45% Cos Fear More Complex Attacks On Their IT Infrastructures

45% Cos Fear More Complex Attacks On Their IT Infrastructures

FP Archives • February 3, 2017, 00:08:23 IST
Whatsapp Facebook Twitter

Threat of targeted attacks redefines requirements for corporate-class security solutions, finds Kaspersky.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
45% Cos Fear More Complex Attacks On Their IT Infrastructures

Nearly half of the companies that participated in the IDC Market Analysis Perspective: Worldwide Security Products survey conducted by IDC in December 2012, believe that increasingly sophisticated attacks pose a serious threat to their IT infrastructures. It’s becoming more and more common for cybercriminals to use dedicated malicious software to launch attacks on corporations, eschewing widely-recognised malware tools and making it harder to detect and repel intrusions. As a result, companies have more stringent requirements for their corporate security solutions, analysts say.
“The sophistication and complexity of the attacks increases the need for advanced anti-malware offerings that appreciate the multiple attack points (web, network, device, etc.) used to infiltrate the endpoint and minimise the resources needed to thwart these attacks and protect the asset (device and data),” said Kevin Bailey, Research Director, EMEA Software Security Products and Services Policies, IDC.

STORY CONTINUES BELOW THIS AD

A number of incidents took place last year in different parts of the world that compromised the security of various corporate networks, with existing security software powerless to intervene. In the hope of making big gains from selling stolen confidential data (such as corporate intellectual property, business-critical information, etc.), cybercriminals invest heavily on purchasing and/or developing malware that can bypass most existing security solutions. In response, Kaspersky Lab invests aggressively in the development of heuristic and proactive technologies meaning its solutions are capable of detecting malware even if it is previously unseen or being used for the first time.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Of all new threats detected in 2012 by Kaspersky Lab’s products, 87 percent were detected with the help of heuristic technologies incorporated into a number of products, including Kaspersky Endpoint Security for Business. Whatever method cybercriminals use when trying to penetrate a corporate network, they will have to confront these technologies.

For example, if the attackers know that software with unpatched vulnerabilities is present on corporate computers, they may attempt to exploit them to covertly infect corporate computers.

Cybercriminals typically exploit vulnerabilities existing in popular software, such as Adobe Flash, Adobe Reader, Java, web browsers or OS components. Since these types of applications are legitimate and often used by corporate employees, the attackers gamble that security solutions will “overlook” the irregular behavior of a specific commonly used program, allowing malware to pass unnoticed. Kaspersky Lab’s products incorporate the System Watcher software module which regularly analyses code for suspicious modifications, even in trusted applications. Besides, the dedicated Automatic Exploit Prevention technology, implemented as part of the System Watcher module, is able to detect and block typical exploit behaviour.

STORY CONTINUES BELOW THIS AD

Cybercriminals often attempt to infect computers in the target corporate network with the help of so-called rootkits and bootkits. These highly dangerous malware types modify the boot sector on the hard drive of the target computer so they can launch before the operating system or the installed security software. The Anti-Rootkit technology implemented in Kaspersky Endpoint Security for Business and several other products, intercepts and analyses all instances when the hard drive’s boot sector is accessed, checking their legitimacy and preventing possible infection. Moreover, even if the rootkit was somehow able to modify the boot record, Kaspersky Lab’s technology will detect it and undertake to treat the infection.

Multiple vectors

As the BYOD (Bring your Own Device) trend develops, corporate employers increasingly allow personal mobile devices for work, giving cybercriminals more and more opportunities to penetrate corporate networks. The wide range of mobile devices and operating systems gives them a wide choice of attack vectors. For instance, a vulnerability in a mobile device connected to a corporate network, once successfully exploited, could allow a cybercriminal access even if the other network segments are well protected. The technologies for securing and managing corporate mobile devices available in Kaspersky Endpoint Security for Business offer a robust response to the growing number and complexity of attack vectors which develop in BYOD environments.

STORY CONTINUES BELOW THIS AD

In particular, Kaspersky Security for Mobile, apart from scanning mobile devices for malware, can apply various restrictive policies to installed applications, identify jailbroken devices, and remotely wipe corporate data stored in a device if there’s a risk it has been compromised.

In summary, Kaspersky Lab’s technologies protect every weak point presented by mobile devices, thwarting attempts to attack corporate networks. By virtue of deeply integrated security technologies for various types of device, they provide security from combined attacks, when cybercriminals attempt to break into corporate IT infrastructures by using both vulnerabilities existing in desktop software and breaches in mobile device security.

Tags
Infrastructure Security IT Malware attack
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV