Documente Academic
Documente Profesional
Documente Cultură
FOR RESILIENT
CYBERSECURITY
WHITE PAPER
CONTENTS
Executive Summary 3
Choose the Right Security Tools - Design for Both Security and Flexibility 5
Prepare for Threats, Breaches and Attacks - Correlate Signals and Orchestrate Responses 7
Conclusion 9
Hybrid
Cloud
On-Premise
1 Stanganelli, Joe. “The High Price of Downtime.” NetworkComputing. Jan. 28, 2016. http://www.networkcomputing.com/networking/high-price-it-downtime/856595126.
KEY TAKEAWAY:
KEY TAKEAWAYS:
2 Ponemon Institute. 2016 Cost of Data Breach Study: Global Analysis. June 2016. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03094WWEN
Given the growing size, complexity and stealth of today’s cyber-attacks, these
advantages of cloud-based security services are essential for:
•• In-depth, real-time threat intelligence
•• DDoS attack filtering and mitigation
•• DNS protection
KEY TAKEAWAY:
ABOUT VERISIGN
Verisign, a global leader in domain names and internet security, enables internet
navigation for many of the world’s most recognized domain names and provides
protection for websites and enterprises around the world. Verisign ensures
the security, stability and resiliency of key internet infrastructure and services,
including the .com and .net top-level domains and two of the internet’s root
servers, as well as performs the root zone maintainer function for the core of
the internet’s Domain Name System (DNS). Verisign’s Security Services include
Distributed Denial of Service Protection and Managed DNS. To learn more about
what it means to be Powered by Verisign, visit Verisign.com.