Application Security: Countering
The Professionals
by Robin Layland
Published September 2006; Posted December 2006
Abstract:
Attacks are moving up the stack and
getting more sophisticated. Are you ready to deal with them?
Security threats and attackers are turning professional. Network managers still
need to stop the script-kiddies from defacing their websites, but it is becoming
increasingly important to stop the professionals who want to steal valuable
information. The new attackers search for vulnerabilities in the application and
exploit these weaknesses. Attackers are bypassing the traditional network-layer
firewall and IDS defenses; their exploits appear as legitimate traffic to the
network layer defense, but hiding in the application layer are deadly attacks.
Working to counter these threats are a collection of security vendors, some
established, some new. Well-known security vendors such as Cisco and Radware
have been joined by new security players such as NetContinuum, Imperva, Citrix,
Breach Security, Protegrity and ConSentry Networks. Additional players can be
expected to join the field in 2007. Their goal is to take security to the next
level and protect both the network and applications.
|
|||||
Return to Business Communications Review Gold Sponsor Archives |
About the author:
Robin Layland is president of Layland Consulting, a firm that specializes in network architecture and new technology. He has more than 25 years’ experience in enterprise networking as both a consultant and working at technical and management positions.
This article is reproduced by special arrangement with our partner, Business Communications Review. |
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.