• United States

Risk-discovery engines mitigate threats

Feb 27, 20061 min

* How risk-discovery engines can keep a CEO's nightmares at bay

Risk-discovery engines mitigate threats

By Kevin Cheek

Most companies are not prepared for the CEO’s worst nightmare: insiders disseminating sensitive data electronically. It only takes one insider to expose a company’s most vital assets, destroying its brand, reputation and shareholder value.

Network content-monitoring hardware appliances equipped with risk-discovery engines can provide visibility into the data entering and leaving a network. They can help enterprises protect, for example, customer data and intellectual property, and help organizations comply with regulations.

Risk-discovery engines passively monitor inbound and outbound traffic at wire speed, flowing over a network regardless of protocol or port. TCP flows are captured, reassembled and analyzed in real time to identify threats and send alerts.

Pre-defined and custom policies that perform pattern matching can be applied to traffic to identify information. An engine also can be configured to store traffic that violates policies, as well as traffic that does not trigger them, and can make the latter available for querying over historical datastreams.

To read this story in its entirety, please click here.

Cheek is vice president of product management for Reconnex. He can be reached at