For network administrators, the best security protection strategies have involved intrusion detection systems (IDSes), such as firewalls and anti-virus software. However, new active Internet content threats will demand more complete strategies says the report Active eIRM - New Realities in Security for Managing Electronic Infrastructure Risks, by Boston-based Aberdeen Group Inc. (www.aberdeen.com), which provides IT market intelligence, positioning and market acceleration services.
IDSes have one major flaw; they rely solely on pattern recognition and are only as good as their last signature files. Recent Aberdeen research found the following security risk data:
The most dangerous code is now active Internet content, which includes malicious code, software microbes, Trojan horses, worms, backdoor traps, password stealers, e-mail handle grabbers, and port snatchers.
IT managers and network administrators say that the heart of any reliable security plan is being able to detect actual risk, and then establish and implement measurement systems, the Aberdeen report says.
According to Aberdeen, the most comprehensive new strategy to combat active Internet content is active electronic infrastructure risk management (Active eIRM), which is a combination of security policy, security applications, risk analytics, notification systems, and software agents. Active eIRM includes:
The overall theme of Active eIRM is automation and comprehensive data collection, analysis and policy building. By combining security policy and risk analytic applications for use with existing security point products and the new class of distributable policy enforcement agents, network administrators can more fully automate security processes. Three components - policy, monitors, and event logs - should be present in every repeatable and testable security deployment.
The Aberdeen report profiles the following companies that are developing new and effective security products that fit well into the Active eIRM scheme:
While no security system is impregnable, by combining data collection and analysis with advanced protection applications, network administrators should be better prepared for tomorrow’s security threats.