Dynamic defenses interact directly with attackers. By dynamically intensifying attacker interactions, dynamic defenses confirm the attacker’s purpose, clarify the threat level of each attacker session, and pragmatically contain the attacker’s activities. Operating in real-time and individually with each attacker session, the interaction and containment can last as long as the attacker engages or until the attacker is removed from compromised systems. Also, dynamic defenses are virtual. Once the attack stops, the defense concludes—no wasted resources. In the end, malicious activity is prevented from reaching and harming targeted assets, without layers of static rules.
To add color on dynamic defenses, two examples are described in this insight. The first is a cloud-based deception approach from Acalvio; and the second is a rule-less Web Application Firewall (WAF) by Threat X, also cloud-based.
Introduction
Acalvio
Threat X
Stratecast - The Last Word
About Stratecast
About Frost & Sullivan
Speak directly with our analytics experts for tailored recommendations.
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
| Deliverable Type | Strategic Forecasting |
|---|---|
| No Index | No |
| Podcast | No |
| Author | Michael Suby |
| Industries | Information Technology |
| WIP Number | 9B0F-00-52-00-00 |
| Is Prebook | No |
| GPS Codes | 3031,9455,9477,D562 |
Dynamic Cyber Defenses: A Fresh Approach to an Old Problem
06-Apr-2018
North America
Strategic Forecasting
