You are here

Threats on the Horizon: The Rise of the Advanced Persistent Threat

APTs Then and Now

Advanced Persistent Threat (APT) technology, also known as an Advanced Targeted Attack (ATA), has evolved at a Moore’s Law clip since magician Nevil Maskelyne hacked a public demonstration of apparently secure wireless telegraphy technology in 1903, sending insulting Morse code messages through an auditorium’s projector.(2) Since the dawn of the computer age, people have used advanced software to target specific companies or individuals in an attack designed to either damage or steal data. What makes today’s APTs unique and frightening are the sophistication of the malware, the vectors they’re choosing for attack and the perseverance with which they’re going after their targets.

In the following whitepaper, we’re going to examine:

  • The history of Advanced Persistent Threats (APTs)
  • Fast facts and figures
  • The groups behind these types of attacks
  • How the attacks work
  • How to protect against them



Fill out the short form below to access the Full Report or the 5 page Executive Summary

 
 
 
 
 
 
 
 

Please fill out the form below to access this content

CALL NOW! 1-866-868-3678

Testimonials


Security virtualization rapidly became the answer to our needs and only Fortinet could offer to virtualize all the essential security functions on a single platform that would scale to thousands of users. On top of the strong performance and flexibility of Fortinet's appliances, we were impressed with Fortinet's management and reporting tools, which will allow us to provide a unique Web interface to our customers so that they have easy control and visibility over their security service.

Hendrik Van De Velde
Vice President, Product and Solution Management
Belgacom