首页> 外文期刊>C4ISR: The journal of net-centric warfare >Cyber shift: Competitors question Symantec's decision to sell cyber tools, not just services
【24h】

Cyber shift: Competitors question Symantec's decision to sell cyber tools, not just services

机译:网络转变:竞争对手质疑赛门铁克决定出售网络工具而不仅仅是服务的决定

获取原文
获取原文并翻译 | 示例
       

摘要

The long-standing practice for cybersecurity vendors McAfee, Sophos and Symantec has been to own and operate thousands of malware spotting computers around the world called honey pots. When a malware author stumbles into a honey pot, he thinks he's tapping into an actual Web server or file transfer protocol site, but in fact he's being watched by a cyber sensor. The malware is transferred to a lab, where analysts try to reverse engineer it as the first step toward alerting government agencies, corporations or consumers. Symantec of Mountain View, Calif., has surprised its competitors with a plan to turn that tradition around 180 degrees. In February, the company announced it would package versions of its honey pot sensors and automated analytic tools and begin marketing them to U.S., government agencies, NATO and major corporations. Customers would be able to sense malware on their own and conduct analyses in labs set up for them by Symantec.
机译:网络安全厂商McAfee,Sophos和Symantec的长期做法是拥有并运营着数千个恶意软件,这些恶意软件在全球范围内发现了称为蜜罐的计算机。当恶意软件作者偶然发现一个蜜罐时,他认为他正在使用实际的Web服务器或文件传输协议站点,但实际上,他正在被网络传感器监视。该恶意软件被转移到实验室,分析人员尝试对它进行反向工程,这是向政府机构,企业或消费者发出警报的第一步。加利福尼亚州山景城的赛门铁克公司计划将这一传统旋转180度,这令其竞争对手感到惊讶。今年2月,该公司宣布将打包其蜜罐传感器和自动分析工具的版本,并开始将其营销给美国,政府机构,北约和主要公司。客户将能够自行检测恶意软件,并在由Symantec为他们建立的实验室中进行分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号