Peer to Peer Magazine

Winter 2014

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/448505

Contents of this Issue

Navigation

Page 7 of 75

WWW.ILTANET.ORG 9 SaaS applications sift through granular bits of server log information to correlate data and look for anomalies. HOW THE CLOUD CAN HELP These layers need to be monitored 24/7 to identify intrusion attempts at various stages and to help ward off attackers during traditional intrusion processes. However, you don't have to hire new IT security staff to address these network layers; all the security elements can be applied via the cloud. Security as a service (SaaS) is a cloud- based offering that puts the watchful eye of an entire IT security team on the network without having to hire full-time staff. SaaS applications sift through granular bits of server log information to correlate data and look for anomalies. Out of potentially tens of thousands of log entries, SaaS applications can find any instances that match specific malware, botnet and other hacker traits, sending alerts to IT staff members. IT staff can then identify and focus on the most important threats. This cloud- based security process greatly reduces the time and frustration typically associated with identifying hacker activity while giving law firms the option of an on-demand security force trained in the most recent hacker codes and activities. A STRONG DEFENSE Facebook, LinkedIn and Twitter have become just as useful communication tools as PCs and smartphones. However, in the same manner that hackers use PCs and smartphones as a conduit for their malicious code, social engineering tactics are being used to establish instant associations and entice victims to click on innocent-looking URLs that are really Trojan Horses filled with a world of trouble. The best way to combat these attacks is with a multilayered network security approach. SaaS applications can be a helpful way to manage the complicated security required in today's data-driven environment.

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Winter 2014