ABINGDON, England, July 16, 2013 /PRNewswire/ --
Threat of targeted attacks redefines requirements for corporate-class security solutions
Nearly half of the companies that participated in the 'IDC Market Analysis Perspective: Worldwide Security Products survey' conducted by IDC in December 2012, believe that increasingly sophisticated attacks pose a serious threat to their IT infrastructures. It's becoming more and more common for cybercriminals to use dedicated malicious software to launch attacks on corporations, eschewing widely-recognised malware tools and making it harder to detect and repel intrusions. As a result, companies have more stringent requirements for their corporate security solutions, analysts say.
"The sophistication and complexity of the attacks increases the need for advanced anti-malware offerings that appreciate the multiple attack points (web, network, device, etc.) used to infiltrate the endpoint and minimise the resources needed to thwart these attacks and protect the asset (device and data)," said Kevin Bailey, Research Director, EMEA Software Security Products and Services Policies, IDC.A number of incidents took place last year in different parts of the world that compromised the security of various corporate networks, with existing security software powerless to intervene. In the hope of making big gains from selling stolen confidential data (such as corporate intellectual property, business-critical information, etc.), cyber criminals invest heavily on purchasing and/or developing malware that can bypass most existing security solutions. In response, Kaspersky Lab invests heavily in the development of heuristic and proactive technologies meaning its solutions are capable of detecting malware even if it is previously unseen or being used for the first time. Kaspersky Lab proactive protection technologies Of all new threats detected in 2012 by Kaspersky Lab's products, 87 per cent were detected with the help of heuristic technologies incorporated into a number of products, including Kaspersky Endpoint Security for Business. Whatever method cyber criminals use when trying to penetrate a corporate network, they will have to confront these technologies. For example, if the attackers know that software with unpatched vulnerabilities is present on corporate computers, they may attempt to exploit them to covertly infect corporate computers.