NetScout : How Application Layer Attacks Impact Edge Architecture –

   As we approach the two-year mark since the start of the COVID-19 pandemic, IT and security teams continue to grapple with massive changes it has wrought on enterprise networks. One of the biggest changes has been the need to support remote work, which initially was believed to be a temporary strategy necessary to keep businesses operational during the pandemic.     <br>       However, companies increasingly are realizing that remote work is here to stay. In fact, <a rel="nofollow" href="">87 percent of workers say they want to continue working remotely after the pandemic</a>. And <a rel="nofollow" href="">42 percent of workers say they'll look for jobs elsewhere</a> if their current company doesn't continue to offer long-term remote work options.     <br>       The need to support remote work and deal with other pandemic-related stresses has led many companies to embrace edge architecture, which enables processing and data storage to happen closer to the data source. Edge computing enables enterprises to increase network performance by reducing the need to send captured data from the network periphery back to a central system.     <br>       And there's no question that enterprises want to glean the benefits of edge computing. In fact, more than <a rel="nofollow" href=",by%20the%20end%20of%202023.">half of all enterprises are expected to use edge computing</a> for six or more use cases by the end of 2023. But as enterprises increasingly embrace the edge, cyberattackers are placing greater focus on it as well.     <br>       Although a great deal of attention has been focused on stopping distributed denial-of-service (DDoS) attacks at the edge, what's actually needed is focus on smaller attacks-such as application layer attacks. Application layer attacks are primarily launched using discrete intelligent clients and target specific vulnerabilities or issues within an application. The result is that the attack renders the application incapable of delivering content to the user.     <br>       Three common application layer attacks illustrate their effectiveness:     <br>       These attacks are made more insidious by the fact that attackers use them to monitor the results of their efforts. When vulnerabilities are found, the attacker modifies the attack to overcome the network's defenses. Successfully detecting and stopping application layer attacks requires intelligent DDoS attack protection at the network edge to maintain the availability of business-critical applications.     <br>       To learn more about how application layer attacks impact edge architecture, read the new white paper, <strong><a rel="nofollow" href="">As Enterprises Increasingly Embrace Edge Computing, Two Use Cases Underscore The Need For Intelligent, Automated Edge Protection</a></strong><a rel="nofollow" href="">,</a> or reach out today to learn more from one of our security experts.      <br><strong>Attachments</strong><br><strong>Disclaimer</strong><br><strong>NetScout Systems Inc.</strong> published this content on <strong>11 January 2022</strong> and is solely responsible for the information contained therein. Distributed by <a rel="nofollow noopener" href="" target="_blank">Public</a>, unedited and unaltered, on <strong>11 January 2022 15:17:06 UTC</strong>.       <br><br><a href="">source</a>
Share this post:

Leave a Reply