Browse Definitions:
Definition

adaptive security

Contributor(s): Matthew Haughn

Adaptive security is an approach to safeguarding systems and data by recognizing threat-related behaviors rather than the files and code used by virus definitions. The essence of the approach is the ability to adapt and respond to a complex and constantly changing environment.

Adaptive security software uses heuristics to more proactively predict, recognize and deal with threats like malware and hackers autonomously, aside from logging and alerts. Using its heuristics, the software can track application and system behavior and recognize events that are out of the ordinary, tracking the behavior to its source. Tracking behaviors helps protect against advanced threats far better than traditional security products can.

Adaptive security provides finer-grained controls to adapt to changes in the network and computing environment, as well as dashboards for better monitoring. The software autonomously blocks behaviors but allows for human intervention. Notifications alert security staff to new behaviors, which they can selectively allow to enable continued functioning in the changing environment.

Developing trends like the Internet of Things (IoT) have increased the security burden significantly and necessitated a more sophisticated approach to deal with the multitude of devices and systems connected and communicating online. To compete with adaptive products, conventional security software requires extensive behavior whitelists for normal system and software actions or, conversely, blacklists defining them as out of the ordinary. According to some security experts, adaptive security products may make virus definitions obsolete.

This was last updated in January 2017

Continue Reading About adaptive security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • incident management plan (IMP)

    An incident management plan (IMP), sometimes called an incident response plan or emergency management plan, is a document that ...

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close