Page 29 - index
P. 29







Unlike older, static approaches that require manual configuration of fixed sets of parameters to
look for, automated continuous monitoring enables risks to be better understood and threats to
be prioritized and mitigated more rapidly (in some cases, even automatically).


Ultimately, continuous monitoring provides visibility across the cyber kill chain, giving network
security staff immediate insights into attempts at reconnaissance, breaching and exfiltration.

This has become a best practice because it focuses directly on the actions that such code
takes, while freeing network security teams from repetitively chasing log files or being inundated
with alerts so that they can focus on the bigger picture and more effectively stop attacks.

About The Author:

Dr. Tim Liu is the CTO of Hillstone Networks where he is in charge of
product strategies and direction, technology innovation and advanced
research. Before joining Hillstone Networks, Mr. Liu was a senior R&D
manager in Juniper Networks and was in charge of designing and
developing NetScreen's VPN product. Previously, he held positions in
R&D and management at Intel, Silvan Networks, Enfashion and
Convex Computer, and led technology teams achieving many
technical patents. Mr. Liu graduated from the University of Science
and Technology in China and obtained a Ph.D. in physics from
University of Texas at Austin in 1993.


Tim can be reached online [email protected] and at our company website
http://www.hillstonenet.com/
























29 Cyber Warnings E-Magazine – June 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   24   25   26   27   28   29   30   31   32   33   34