As cyber attacks increase in sophistication and penetrate networks with ever-greater frequency and effectiveness, security professionals are expressing growing concerns about being able to quickly detect and stop inside-the-network threats from both internal and external threat actors.
The growing number of these cyber attacks and the increased volume of stolen records being detected by external sources has driven many organizations to a new adaptive approach to network security. This new approach assumes that an organization’s perimeter has already been breached and that persistent attackers are going to penetrate it.
A modern adaptive defense based on this assumption brings with it a new set of security goals. These goals are no longer solely based on stopping attacks, but focus on detecting and neutralizing attacks in real-time