We recommend that you install the most recent software release to stay up-to-date with the latest functional
improvements, stability fixes, security enhancements and protection against new and evolving attacks.
The latest version of this document is at:
Security vendors strive to provide new and innovative products and services that
allow customers to rapidly deploy and provide optimal protection against today's
continually evolving and sophisticated threat ecosystem.
Despite these ongoing efforts, traditional security solutions and approaches by
themselves sometimes fall short in protecting enterprises against many of today's
complex and zero-day attack forms. The reality is that due to existing unknown
security gaps and vulnerabilities, current enterprise infrastructure security is not
Packet snooping can be detected in certain instances, but it usually occurs without anyone
knowing. For packet snooping to occur, a device must be inserted between the sending and
receiving machines. This task is more difﬁcult with point-to-point technologies such as
serial line connections, but it can be fairly easy with shared media environments. If hubs or
concentrators are used, it can be relatively easy to insert a new node. However, some
devices are coming out with features that remember MAC addresses and can detect whether
a new node is on the network.