Browse Definitions :
Definition

adaptive security

Adaptive security is an approach to safeguarding systems and data by recognizing threat-related behaviors rather than the files and code used by virus definitions. The essence of the approach is the ability to adapt and respond to a complex and constantly changing environment.

Adaptive security software uses heuristics to more proactively predict, recognize and deal with threats like malware and hackers autonomously, aside from logging and alerts. Using its heuristics, the software can track application and system behavior and recognize events that are out of the ordinary, tracking the behavior to its source. Tracking behaviors helps protect against advanced threats far better than traditional security products can.

Adaptive security provides finer-grained controls to adapt to changes in the network and computing environment, as well as dashboards for better monitoring. The software autonomously blocks behaviors but allows for human intervention. Notifications alert security staff to new behaviors, which they can selectively allow to enable continued functioning in the changing environment.

Developing trends like the Internet of Things (IoT) have increased the security burden significantly and necessitated a more sophisticated approach to deal with the multitude of devices and systems connected and communicating online. To compete with adaptive products, conventional security software requires extensive behavior whitelists for normal system and software actions or, conversely, blacklists defining them as out of the ordinary. According to some security experts, adaptive security products may make virus definitions obsolete.

This was last updated in January 2017

Continue Reading About adaptive security

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any ...

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close