The quarterly publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/448505
WWW.ILTANET.ORG 9 SaaS applications sift through granular bits of server log information to correlate data and look for anomalies. HOW THE CLOUD CAN HELP These layers need to be monitored 24/7 to identify intrusion attempts at various stages and to help ward off attackers during traditional intrusion processes. However, you don't have to hire new IT security staff to address these network layers; all the security elements can be applied via the cloud. Security as a service (SaaS) is a cloud- based offering that puts the watchful eye of an entire IT security team on the network without having to hire full-time staff. SaaS applications sift through granular bits of server log information to correlate data and look for anomalies. Out of potentially tens of thousands of log entries, SaaS applications can find any instances that match specific malware, botnet and other hacker traits, sending alerts to IT staff members. IT staff can then identify and focus on the most important threats. This cloud- based security process greatly reduces the time and frustration typically associated with identifying hacker activity while giving law firms the option of an on-demand security force trained in the most recent hacker codes and activities. A STRONG DEFENSE Facebook, LinkedIn and Twitter have become just as useful communication tools as PCs and smartphones. However, in the same manner that hackers use PCs and smartphones as a conduit for their malicious code, social engineering tactics are being used to establish instant associations and entice victims to click on innocent-looking URLs that are really Trojan Horses filled with a world of trouble. The best way to combat these attacks is with a multilayered network security approach. SaaS applications can be a helpful way to manage the complicated security required in today's data-driven environment.