A Service-centric Approach to APTs

Managed Security Service Providers Help Resource-constrained Organisations Fight APTs

Feb 02, 2016, 19:01 ET from ReportBuyer

LONDON, Feb. 2, 2016 /PRNewswire/ -- In this research service, Frost & Sullivan focuses on the advanced persistent threats (APT) landscape in Europe, the Middle East, and Africa (EMEA) and the technologies that are offered by service providers that aim to help the organizations protect themselves against these threats. The first section covers the background information on APTs and a view of the managed security services market from an EMEA perspective. The second section offers market information and data on specific technologies that are designed fight APTs, looking at several service providers and cyber security companies in this market.

Introduction
In this study, Frost & Sullivan focuses on the Advanced Persistent Threats (APT) landscape in Europe, the Middle East, and Africa (EMEA), and the technologies offered by service providers to help organizations protect themselves against these threats. The first part covers background information on APTs and a view of the managed security services market from an EMEA perspective. The second part offers more detailed information on specific technologies to fight APTs, looking at several service providers, cyber security companies, and partnerships in this market.

Background
The increased use of technologies for business processes in a distributed, outsourced world has created an environment where advanced persistent threats are thriving. This is exemplified by high-profile data breaches like the Sony Pictures hacking in late 2014. In the recent past, APTs were designed by sophisticated hackers that were financed by nation states to spy on adversaries for strategic advantage. Today, many cybercriminals are using the same techniques to steal data from businesses for financial gain. In this sense, APTs are the result of lessons learned by malicious actors from nation state cyber-attacks such as GhostNet. State actors continue to spy on each other, whether for strategic military purposes during war conflicts, or for political gain, as with the Stuxnet case. When it comes to critical infrastructure2, cyber criminals can wreak havoc by gaining access to telecommunications, transportation, flight control systems, and the electricity, gas, and water supply.

Download the full report: https://www.reportbuyer.com/product/3028285/

About Reportbuyer
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
http://www.reportbuyer.com

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: query@reportbuyer.com
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer



RELATED LINKS

http://www.reportbuyer.com