Newer Security Technology Goes on the Offensive
For two decades, network security has implemented age-old perimeter defense mechanisms in an attempt to secure valuable assets. While the tactic of protection, detection and infection has had varying degrees of success, it’s never approached an impenetrable fortress. Perimeter defense technologies will always be the mainstay of any security operation center, but new offensive tactics that go directly after the attacker are starting to emerge. Instead of detecting threats that have already breached the security perimeter, newer technologies are seeking threats at the source through identity analytics, deception and public data mining.