In Pictures: Antivirus shootout - 7 old-school vendors show off new tricks
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker.