advanced evasion techniques

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Aug 31, 2018
Netzwerke werden immer sicherer – gleichzeitig treten jedoch neue, getarnte Hacking-Methoden immer häufiger auf und sind schwieriger zu erkennen. Unternehmen müssen den Schutz ihrer Netzwerke überdenken, da ausgeklügelte Verschleierungsmethoden (Advanced Evasion Techniques), die Exploits und Malware vor der Erkennung durch Firewalls und Eindringschutzsysteme (IPS) schützen, vermehrt Aufmerksamkeit erregen. Obwohl Verschleierungsmethoden ausführlich dokumentiert sind und zunehmend in unabhängige Tests der Wirksamkeit von Sicherheitsmaßnahmen einfließen, ignorieren einige Anbieter von Sicherheitslösungen systematisch deren Bedeutung und verharmlosen sogar die Bedrohung durch Verschleierungen als theoretisch.
Tags : 
    
Forcepoint
Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware, anti virus, firewalls, high availability, internet security
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware, anti virus, application security, firewalls, high availability, internet security
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
McAfee
Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware, anti virus, application security, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, security management, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : 
hacker detection, advanced evasion techniques, network security, it security, security management
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, networking, firewalls, internet security, intrusion detection, intrusion prevention, security management, vulnerability management, data loss prevention
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance, security management
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, anti spam, anti spyware, anti virus, firewalls, high availability
    
McAfee
Published By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, security, it management
    
McAfee
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti, security, it management
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti, next generation firewall, ngfw, network security, firewalls
    
McAfee
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips, security, it management
    
McAfee
Published By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : 
security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security, email security, encryption, internet security, security management
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
McAfee
Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, firewalls
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, security
    
Intel Security
Published By: Forcepoint     Published Date: Nov 17, 2017
evasion techniques (AETs) continue to break the security protection model that most organizations are using today. Given this challenging threat landscape, you need to rethink your traditional security model. This complimentary e-book will help you:
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Nov 17, 2017
Networking communication protocols make it possible for the Internet to work. Unfortunately, criminals can use those trusted systems to obfuscate malicious data and penetrate your network defenses undetected. An advanced evasion technique (AET) is a method of delivering an exploit or malicious content into a vulnerable target so that the traffic looks normal and security devices will pass it through. By combining attacks using several protocol layers, these advanced evasions bypass most existing security solutions. Forcepoint NGFW (Next-Generation Firewall) applies sophisticated analysis techniques specifically to detect this type of attack. Download this whitepaper to find out more.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
IBM
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.