Prevention is not enough – Prevention-centric security deployed at the network perimeter provides a single imperfect chance to stop a cyber attack. But what if it doesn’t even get that chance? What if an employee’s laptop gets infected at a coffee shop? They will walk the infected laptop right past the network perimeter. The truth is, all organizations have infected devices on their networks. Once the cyber attackers gain a foothold, they are free to infiltrate further, while the prevention security is blind.
Detecting currently-compromised systems – To detect cyber attacks that already bypassed the network perimeter, security professionals need automated real-time detection and reporting capabilities, ensuring that there is more than one way to stop the progression of a cyber attack. These security solutions must continuously listen, learn, remember and automatically analyze data to anticipate the cyber attackers’ next move to stop them.