Five Styles of Advanced Threat Defense

  • Orans L
  • D'Hoinne J
  • 9

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Abstract

Select and Deploy the Most EffectiveThreat Defense Technologies Knowing what new solutions will best protect your network against advanced attacks is complicated. According to Gartner the most effective protection comes from combining technologies that look in different parts of your network. The goal is to combine solutions that will provide real-time protection that monitor and detect, as well as provide forensic analysis and incident response. Read the Gartner Report “Five Styles of Advanced Threat Defense” where Gartner recommends: "Use Gartner's Five Styles of Advanced Threat Defense Framework to identify complementary solutions and avoid overlapping solutions" "Implement "lean forward" technology from at least two of the three framework layers (network, payload, endpoint)" "Combine solutions that offer a real-time or near-real-time monitoring/detection approach with those that provide incident response and forensic analysis capabilities"

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

There are no full text links

Authors

  • Lawrence Orans

  • Jeremy D'Hoinne

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free