You are on page 1of 3

WHITEPAPER

FEBRUARY 2018

HOW CYBER THREAT


INTELLIGENCE
SAFEGUARDS AGAINST
TODAY’S THREAT LANDSCAPE
HOW CYBER THREAT INTELLIGENCE SAFEGUARDS AGAINST TODAY’S THREAT LANDSCAPE WHITEPAPER 2

As the overall cyber threat environment continues to These conditions are requiring new strategies for network
increase in complexity, it’s becoming more and more security, particularly as cyber protection continues to rank
difficult for organizations across every industry to among business leaders’ top priorities. This is where cyber
adequately protect themselves. Within this landscape, threat intelligence comes in, helping to bridge the gap
organizations are looking for more advanced and between emerging threats and organizational security.
innovative strategies to help them proactively respond
to the latest malware being leveraged by hackers. A CRITICAL SOLUTION:
Enter cyber threat intelligence, a proactive way to
CYBER THREAT INTELLIGENCE
guard against emerging threats that’s becoming a more According to Gartner’s Rob McMillan, cyber threat
critical part of IT security. intelligence can be defined as knowledge about an
emerging threat that can be leveraged to better direct an
organization’s response to that particular hazard. This
knowledge can come from several evidentiary sources,
including certain context clues, indicators, conclusions
and actionable guidance.

According to Gartner’s Rob McMillan, cyber threat


intelligence can be defined as knowledge about an
emerging threat that can be leveraged to better direct an
organization’s response to that particular hazard. This
knowledge can come from several evidentiary sources,
including certain context clues, indicators, conclusions
and actionable guidance.

This evidence-based approach can help an organization


better identify suspicious behavior that may point
to the presence of a threat, allowing the IT team to
INCREASINGLY SOPHISTICATED quickly respond and remediate the threat. This prevents
THREATS DEMONSTRATE NEED FOR the company from having to rely on outdated threat
PROTECTION definitions that previously would allow certain dangers to
slip through the cracks undetected.
Experts and real-world use cases alike show that the
tools traditionally employed – including legacy firewall “Cyber threat intelligence, when used correctly, can help
and antivirus systems – simply cannot keep up with the defenders detect attacks during – and ideally before –
expanding threat landscape: these stages by providing indicators of actions taken
during every stage of the attack,” SANS Institute analyst
(ISC)2 reported that 65 percent of federal government
Dave Shackleford wrote.
administrators don’t believe organizations could
pinpoint and address an ongoing cyber attack. Threat intelligence solutions analyze data pertaining to
Threats abound in the retail sector as well. A study from attacks and vulnerabilities across networks to identify
Tripwire discovered that on average, it takes nearly 200 weak points and attack vectors as they emerge.
days to detect an advanced threat hiding in the
network supporting a retail business.
In 2017, DDos attacks replaced advanced persistent Untangle’s NG Firewall solution
threats (APTs) as the third most significant threat, combines unified threat
according to SANS 2017 Threat Landscape Survey.
management with policy
Cyber crime damage costs are expected to hit $6 trillion
annually by 2021. management tools to enable
There were more than 1,579 reported data breaches in organizations to monitor, manage
2017, a 44.7% year-over-year increase. and shape Internet traffic.
HOW CYBER THREAT INTELLIGENCE SAFEGUARDS AGAINST TODAY’S THREAT LANDSCAPE WHITEPAPER 3

In the current threat landscape, this type of approach


to end-to-end protection is absolutely invaluable. WIth
cyber threat intelligence in place, organizations are better
equipped to battle the newest threats and ensure the
protection of their most important assets.

From the Wannacry cyber attack to the Equifax credit


reporting breach, it is clear hackers are getting more Untangle, Inc.
sophisticated in their attack methods. Organizations 100 W. San Fernando St., Ste. 565
need to be proactive and implement security tools to San Jose, CA 95113
better protect their network and sensitive information. www.untangle.com

ABOUT US
Untangle is an innovator in cybersecurity for
the below-enterprise market, safeguarding
people’s digital lives at home, work and
on-the-go. Untangle’s integrated suite of
software and appliances provides enterprise-
grade capabilities and consumer- oriented
simplicity, bringing a new generation of
smart security to homes and small-to-mid-
sized businesses. Untangle’s award-winning
network security solutions are trusted by over
400,000 customers, protecting nearly 5 million
Thankfully, there are solutions out there that can not only people, their computers and networks around
protect your network at the gateway but also provide the world.
additional protection against unknown and emerging For sales information, please contact us by
malware threats and zero-day exploits. Untangle’s phone in the US at +1 (866) 233-2296 or via
cyber threat intelligence cloud-based service, ScoutIQ™ e-mail at sales@untangle.com.
proactively scans all networks—including encrypted traffic—
for various threats and malware, provides continuous
threat protection by aggregating data from NG Firewall ©2018 Untangle, Inc. All rights reserved. Untangle and the Untangle logo are
deployments worldwide, and synthesizes data from registered marks or trademarks of Untangle, Inc. All other company or product
names are the property of their respective owners.
industry-wide threat intelligence services. By inspecting data
at the metadata level, ScoutIQ is able to better inform the
protection offered by NG Firewall, ensuring that the network
is guarded against even the newest, emerging threats.
Untangle’s NG Firewall solution combines unified threat
management with policy management tools to enable
organizations to monitor, manage and shape Internet traffic.

You might also like