Eze Castle Integration Eze Castle Integration

Eze Castle Blog

What is Active Threat Protection? Stopping Advanced Persistent Threats

By Eze Castle Integration,
Tuesday, July 31st, 2018

According to TechTarget’s SearchSecurity, “an advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.” As with most sophisticated cybersecurity attacks, the goal of the intruder is to capture valuable information and steal data. APT intrusions are often focused on high-value information and sectors such as the financial industry.

The cybersecurity landscape is constantly changing and today the cyber threat actors range from organized crime to state sponsors.

How do hackers gain access?

When it comes to advanced persistent threats, the cyber criminals often use targeted social engineering tactics including spear phishing. In a spear phishing incident, criminals target specific companies or individuals and conduct background research to compile employee names, titles and contact information. Social networks are common resources crawled for this information. Obtaining such details and observing communications provides criminals with the tools to mirror email addresses, website URLs and dialect. The end result is the criminal’s identity masqueraded as a legitimate, trustworthy source.

How can you defend against Advanced Persistent Threats?

Real-time intrusion detection and prevention systems that include 24x7 monitoring by security experts are a key defense in finding and stopping network intruders. Training employees to not fall for social engineering tricks must also occur.

To assist hedge funds and investment firms Eze Castle Integration now offers Eze Active Threat Protection (Eze ATP) which gives firms protection against targeted attacks and advanced persistent threats by combining:

  1. 24x7 Human Security Monitoring via eSentire,

  2. Real-Time Threat Detection and Prevention, and

  3. Incident Remediation.

To explain it further, here’s our 1-minute video on Eze Active Threat Protection

 
 

Related Articles

Categorized under: Security  Cloud Computing  Launching A Hedge Fund  Trends We're Seeing  Videos And Infographics 



Recent Posts / All Posts


 

Subscribe

Follow Us

    Follow us on Twitter Follow us on FaceBook Follow us on LinkedIn Follow us on Google RSS Feed

Recent Articles

Categories

Archives