Video Transcription

are you
threat vectors or pass or tools used by an attacker?
Traditional threat vectors are defined as network avenues, but a more current definition of threat vectors needs to consider how personal devices, cloud based applications and tools sharing applications and environments and even social media services present different security challenges.
Network and mobile services.
Traditional network security means monitoring and limiting access through network points of presence, such as gateway routers that replaced at a network perimeter.
Incorporation of company, wireless or mobile access points in traditional network security is also easy to understand, and every company needs to utilize longstanding network security tools, such as firewalls that could do a good job of controlling incoming ingress and outgoing egress communications.
However, protection in today's cybersecurity landscape presents more significant challenges, and monitoring and protecting with the network perimeter is not sufficient. Users are often participating on multiple networks at the same time, and they expect to stay connected even when they're on mobile and are engaging with different wireless networks.
Traditional network threat vectors, boundaries and defenses are not so commonplace.
An emerging threat vectors will crawl different protection strategies and tactics,
communication tools and applications
because today's workforce is expected to have mobile access to data and application. Resource is there must be additional security services in place. To manage these newly defying threat factors,
end users expect to receive instant notification when every messages sent, and they expect to be able to connect with a one click approach. And I have to wait for a session to be initialized.
Applications such as WhatsApp and instant messaging are also trusted to deliver and received file attachments.
These new threat vectors need to be secured with fast threat inspection services that can allow these APS to inspect or scan for threats and still deliver content in a timely manner.
Sharing environments and social media,
social media and data sharing services, often using always on presence model.
Data sharing services such as one drive and Dropbox replicate user's files to cloud based storage locations seamlessly and often without the end user. Even aware that the sharing practices have occurred,
Social Media Management Application similarly allow users to post or publish content to multiple social media services simultaneously
to meet these demands. These application, designed to be always running, they require the endpoint devices, are listening, available and participating on multiple networks
and often use multiple ports and channels at the same time. These applications air trusted and often run with some local administrative rights. As a result, newly defined threat vectors are difficult to secure.

Up Next