Six Tips to Protect Against Advanced Evasion Techniques

Organizations can increase their level of protection against Advanced Evasion Techniques (AETs).

By Enterprise Networking Planet Staff | Posted Mar 31, 2011
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Stonesoft discovered Advanced Evasion Techniques (AETs) last year and since then the company has verified that the threat posed by AETs to critical data capital and systems is constantly evolving. In this Real Wire news release, Stonesoft offers six tips for organizations to protect their critical data assets and systems against Advanced Evasion Techniques.


"1. Increase your knowledge: of Advanced Evasion Techniques. They differ from traditional evasions in many ways, and it is important to understand that they are not attacks as such, but delivery methods to carry payloads to the vulnerable target without being detected by firewall and IPS devices. Thus, there is no bullet proof solution against them. You can minimize the risk of getting exploited by using a network security solution that is capable of multi-layer traffic normalization and an intelligent security platform that is continuously updated against AETs.

2: Analyze the risks: Audit your critical infrastructure and analyze the most significant assets of your organization, how and where they are currently stored and whether the information is backed up. Prioritize. Start by making sure your critical assets and public services have the best possible protection against AETs.

"3. Re-evaluate your patch management. When possible, patching the vulnerable systems gives the ultimate protection against the network attacks, regardless whether they have been boosted by the AETs. Evasions can only help the attacker to bypass the intrusion prevention systems (IPS) or next generation firewalls (NGFW), but they do not assist in an attack against a patched system. It is understandable, however, that the patch testing and deployment takes time even under the best circumstances and for this time the recommendations for proper IPS protection, as follows, apply."

Read the Full Story at Real Wire

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter