By Anthony Giandomenico | September 19, 2018 Competition between security vendors is a critical component of staying ahead of cybercriminals. While the bottom line is undoubtedly essential, competing for market share and customers also forces security vendors to continually improve their technologies. Someone makes a breakthrough, such as the invention of the Next-Gen Firewall or sandboxing, or the addition of machine learning and AI, and soon everyone is offering a version of that technology, and each iteration is an improvement over the last.
Most of the major security vendors have also invested heavily in teams and technologies that collect, correlate, deconstruct, and build responses to threats. These teams often gather live threat intelligence from thousands, or even millions of their own devices distributed around the world. These threat research engineers also develop and use advanced technologies, combined with the sometimes tedious work of hands-on reverse engineering and analysis, to understand threat trends and tactics of the cybercriminal community. That information is then loaded directly into the devices of their customers to keep them safe from live threats.
Full Article.
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.