A blended threat
can automatically exploit one of many vulnerabilities to compromise a system.
Although the term blended threats
was coined a while ago, it has become increasingly relevant to today's Internet landscape.
To protect your enterprise from the new generation of blended threats
, you need to take a look at the security strategies you currently have in place.
The threats embodied by Nimda and CodeRed are blended threats
: that is, they are multi-faceted in their operating methods and effects.
"Hence to meet this need, Kalm is introducing Broadband solution with cloud-based UTM features that allows SMEs to get round-the-clock fully managed network protection against Internet-based individual & blended threats
without incurring the distraction, expense, and complexity of implementing in-house network systems or security staff," he added.
* "Blended Threats
"With continuous Internet connectivity becoming the lifeline of any business entity, the exposure to blended threats
is always a reality.
Instead, modern blended threats
such as Aurora, Stuxnet, and Zeus infiltrate organizations through a variety of coordinated tactics, usually a combination of two or more.
This leaves them unprepared to deal with sophisticated blended threats
It natively stops a wide range of blended threats
, fragmented and malformed packet attacks, spyware, malware, denial of service and other types of threats and attacks.
"The email and Web security gateway markets have been converging as blended threats
become more advanced and enterprises worldwide want to take a holistic approach to mitigating both message and Web-borne risks," said David Stanley, VP of EMEA for Proofpoint.