2013年8月29日星期四

Machine learning sets new standard in network-based application whitelisting

Using machine learning to automate the current manual process used to gain application visibility brings network visibility and analytics to a new level. By harnessing the power of the semantic Web through machine learning, emerging solutions let you act faster and proactively defend against cyber threats.The timing is good, because new applications are introduced at incredible rates: More than 300 applications are created each day,manlift GTS6 manufacturers and exporters and the Apple AppStore adds some 40,000 apps per month.  While everyone benefits from the application diversity, they prove to be a cyber security challenge.

Security teams must dedicate skilled analysts to monitor and analyze their organizations" network activity to determine if the applications are white-listed or authorized. Unauthorized applications must be blocked from entering the enterprise network, since they might consume bandwidth, lower productivity, compromise critical data or pose potential security threats.Even if the impact of the applications is minimal, it is critical that security organization have complete visibility. Security organizations that employ static methods that is, manual reverse engineering struggle to keep pace with identifying and classifying new applications,buy 28-29M Telescopic Work Platform from China especially given the rate at which new applications are being introduced.

They must use machine learning to discover applications, extract signatures and create white lists. Security analysts can then have the incisive intelligence necessary to act early, without using costly and scarce resources.While deep packet inspection solutions have historically held a place in the cyber security solution landscape, a reliance on analysts to manually reverse-engineer applications is quickly becoming the DPI Achilles" heel. DPI solutions provide visibility and enforcement of traffic policies on traffic for which a packet payload signature exists.

没有评论:

发表评论