DUBLIN, June 10, 2015 /PRNewswire/ -- Research and Markets (http://www.researchandmarkets.com/research/5hghrv/a_servicecentric) has announced the addition of the "A Service-centric Approach to APTs" report to their offering.
This research service focuses on the advanced persistent threats (APT) landscape in Europe, the Middle East, and Africa (EMEA) and the technologies that are offered by service providers that aim to help the organizations protect themselves against these threats. The first section covers the background information on APTs and a view of the managed security services market from an EMEA perspective. The second section offers market information and data on specific technologies that are designed fight APTs, looking at several service providers and cyber security companies in this market.
The increased use of technologies for business processes in a distributed, outsourced world has created an environment where advanced persistent threats are thriving. This is exemplified by high-profile data breaches like the Sony Pictures hacking in late 2014.
In the recent past, APTs were designed by sophisticated hackers that were financed by nation states to spy on adversaries for strategic advantage. Today, many cybercriminals are using the same techniques to steal data from businesses for financial gain. In this sense, APTs are the result of lessons learned by malicious actors from nation state cyber-attacks such as GhostNet.
State actors continue to spy on each other, whether for strategic military purposes during war conflicts, or for political gain, as with the Stuxnet case. When it comes to critical infrastructure2, cyber criminals can wreak havoc by gaining access to telecommunications, transportation, flight control systems, and the electricity, gas, and water supply.
The key paradigm shift in this area that has profound implications for IT security is the threat actor's evolution from using opportunistic techniques to using targeted techniques. Moreover, many threat actors are well trained and well funded, target specific networks for specific purposes, and look to maintain a persistent malicious presence for months or even years. Their ultimate goal is often to maximize monetary gain.
- Dell SecureWorks
For more information visit http://www.researchandmarkets.com/research/5hghrv/a_servicecentric