Organizations have invested heavily in targeted security solutions including firewalls, VPNs, intrusion detection and prevention systems, and vulnerability scanners. Unfortunately these solutions alone have not been able to completely protect organizations from the evolving landscape of threats. Recently there has been a steady increase in the complexity of threats, including zero day attacks, worms and trojans that span many systems and are difficult to detect using existing security solutions (Q1Labs, 2009a). Many companies have implemented some or all of the following security technologies:
Network Intrusion Detection & Prevention Systems
Firewalls
Perimeter
Application
Endpoint
Antivirus & AntiSpyware
Host Intrusion Prevention – HIPS
Behavioral Heuristic Detection
Information/Data Leakage Protection.