Overblog Suivre ce blog
Editer l'article Administration Créer mon blog
Au top des ventes IT

Au top des ventes IT

Blog sur la vente IT aux grands comptes et mid-market.

FireEye : Le Guide de l'ATP à télécharger au format ebook

Pour les novices, l'acronyme ATP signifie Advanced Threat Protection: protection des menaces avancées. il fait référence à des solutions de protection élaborées entre autres sachant se passer des signatures de virus.

 

Ce livre en anglais très complet rédigé par Steve Piper (profil Linked'in) est offert par L'éditeur de la solution de sécurité FireEye dont les solutions sont entre autres utilisées par la Maison Blanche.

Pour Mémoire FireEye propose des solutions contre les attaques Zero Day, et les ransomwares.

FireEye compte 2200 clients dans 60 pays dont 130 au Fortune 500

Extraits du sommaire :

Chapter 1, “Exploring Cyberthreat Trends and Motives,” reviews major trends over the past half-decade that have dramatically changed the way cyberattackers think and operate. We’ll also explore major commercial and government cyberattacks that have made recent headlines.

Chapter 2, “Understanding Advanced Threats,” distinguishes between everyday basic threats and sophisticated, highly customized advanced threats. This chapter also describes why traditional security defenses are not enough and how targeted attack campaigns work.

Chapter 3, “Securing the Perimeter Against Advanced Threats,” reviews the attributes of an “ideal” perimeter-based advanced threat protection solution and then describes how such a solution detects threats within web traffic, email messages, mobile communications, and files at rest.

Chapter 4, “Strengthening Endpoint Advanced Threat Defenses,” describes how host-based advanced threat protection software mitigates attacks on endpoints. We’ll review key components and explore how the solution works.


Chapter 5, “Investigating Advanced Threats with Network Forensics,” describes how to use high-performance packet capture appliances to investigate and remediate advanced threats.


Chapter 6, “Unifying Advanced Threat Protection Defenses,” builds a case for integrating perimeter- and host-based advanced threat protection with network forensics for rapid threat identification and remediation.


Chapter 7, “Selecting a Complete Advanced Threat Protection Solution,” describes exactly what to look for — and, more importantly, what to avoid — when evaluating full-featured advanced threat protection solutions. Vendor-delivered service offerings are also explored.

Le guide complet est à télécharger ici

Articles connexes :

Anatomie-d-une-attaque-zero-day.html

Impact-metier-et-cout-d-une-faille-de-securite-rapport-forrester

Retour sur investissement d'une politique de cybersécurité

La cybercriminalité pourrait couter quelques billions d'ici à 2019

Les 5 tendances de la cybercriminalité pour 2016

Partager cet article

Repost 0
Pour être informé des derniers articles, inscrivez vous :

Commenter cet article