Page 28 - index
P. 28







Continuous monitoring is needed to combat advanced persistent threats

TechCrunch expects that advanced persistent threats will surge over the next year, and that
means cybersecurity tools that can detect malicious code in the network will prevent hackers
from making their stay in a network an extended one.

As organizations everywhere are starting to learn, keeping tabs on what goes through their
networks is a full-time job. Given the regularity with which hackers slip through perimeter
defenses and engage in advanced persistent attacks, continuous monitoring provides an extra
layer of security that stays vigilant even when preventative measures fail.



About the Author

Todd Weller, VP, Corporate Development, joined Hexis Cyber
Solutions in March 2014. His responsibilities include analyst relations,
competitive and market intelligence, corporate visibility, M&A, and
strategic partnership development. Todd draws on his 17+ years of
experience as an equity research analyst where he covered the
security industry for much of that time. In his equity research career
Todd provided research coverage of over 60 companies across
several technology sectors, including security, infrastructure software,
data center/cloud hosting, and healthcare IT.


Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog


Twitter: @hexis_cyber

LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions



















28 Cyber Warnings E-Magazine – January 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   23   24   25   26   27   28   29   30   31   32   33