"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Addressing the Full Attack Continuum: A Security Model for Before, During and After an Attack

White Paper Published By: Cisco
Cisco
Published:  Nov 17, 2014
Type:  White Paper
Length:  5 pages

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.



Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications, web service security

Browse Technology Topics

    
    
    
    
    
    
Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory