{"id":2133,"date":"2006-05-25T00:00:00","date_gmt":"2006-05-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/25\/state-of-technology-beating-back-hackers-collaboration\/"},"modified":"2021-12-30T11:40:45","modified_gmt":"2021-12-30T11:40:45","slug":"state-of-technology-beating-back-hackers-collaboration","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/25\/state-of-technology-beating-back-hackers-collaboration\/","title":{"rendered":"State of Technology: Beating Back Hackers Collaboration"},"content":{"rendered":"<p>At one point, Jeanson James Ancheta, a 21-year-old California hacker, had more than 400,000 compromised computers at his command.  He and his &#8220;botmaster underground&#8221; cohorts would sell access to their &#8220;botnet&#8221; to third parties, which would use it to launch massive distributed denial-of-service attacks, disseminate a torrent of spam and install adware on unsuspecting users&#8217; machines.  Earlier this month, Ancheta became the first person successfully prosecuted for building and using a botnet for malicious purposes.  While the G-men got their man, there are thousands of other Anchetas on the Internet, each using innovative attack tools, techniques and technologies to compromise networks and steal their way to more bandwidth, information and money.  Fortunately, security VARs have a wide range of innovative technologies to protect their customers&#8217; IT infrastructures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>And resellers that are trying to stay ahead of the curve may find that some of their most innovative solutions come from a surprising source: their customers.<\/p>\n<p>A plurality of small (31 percent) and midsize VARs (27 percent) see network connectivity as the most innovative security area.  Among large VARs, 20 percent cited identity management.  But network access, identity management and threat management are viewed as being creative in their own way. Meanwhile, small VARs (23 percent) are anticipating the most innovative gains to be made in threat management in the coming year, while midsize (21 percent) and large VARs (27 percent) see identity management as the hotspot.<\/p>\n<p>One thing resellers of any size generally agree on is that the most useful new security features are ease of updating and automated responses to threats, and the majority of them also feel that the most innovative solutions arise from vendors and solution providers working closely together.<\/p>\n<p>The trick for resellers is to figure out what counterthreats they have in their arsenals.  While vendors work away in their labs to create new products, security solution providers are finding that they can be most innovative by creating services for their customers that knit together disparate technologies, whether from one vendor or several different ones.<\/p>\n<p>CSCI, a networking and security solution provider in San Diego, has spent the past few years aggressively building its managed-services practice to complement its product business.   One project that Juniper has fleshed out is a sort of matchmaking system in which it pairs VARs with other technology partners wherever they identify a potential fit.  Recently, the vendor introduced CSCI to security-services powerhouse VeriSign, allowing the two to create an SMB security-services suite.<\/p>\n<p>http:\/\/www.varbusiness.com\/sections\/technology\/tech.jhtml;jsessionid=LBUAOBCWUCKCGQSNDBECKICCJUMEKJVN?articleId=187900121&#038;printableArticle=true<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2133","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2133"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2133\/revisions"}],"predecessor-version":[{"id":4620,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2133\/revisions\/4620"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}