We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Threat Management?

Mary McMahon
By
Updated: May 16, 2024

Threat management is an approach to network security which integrates a number of different approaches to threats which are designed to thwart them before they actually enter the system. Rather than dealing with threats on a case-by-case basis, this approach focuses on making the overall system more secure, to stop threats in their tracks and deter people who might attempt to compromise the system. There are a number of approaches which can be integrated into a successful threat management strategy, and several firms specialize in providing advice on setting up these types of systems.

A number of different things can pose a threat to network security. Some are obvious: viruses, trojans, spam, and worms which enter a system can compromise security and potentially bring the system down while people address them. Other threats can include things like security leaks from careless employees inside the network, hacking attempts, and phishing. Threat management recognizes all of these potential issues and creates safeguards against them.

One technique involves a heavily reinforced firewall which is designed to repel threats. At the gateway to the network, software which scans for malicious software and other problems can be implemented so that threats never get inside the network. Likewise, a system which monitors and reacts to activity can also be installed to stop people such as hackers from getting into the system. Another aspect of threat management involves regularly updating software with the latest information about threats so that it can respond quickly.

The goal is to prevent intrusion by staying ahead of and thwarting threats, rather than dealing with them once they are already inside the system. It can be challenging, but ultimately less costly than dealing with the aftermath of something which has entered the system. Much of threat management can also be accomplished through automated systems, allowing network administrators to focus on unusual activity and meeting the needs of network users, rather than on babysitting the network as a whole.

Companies which offer consulting in this area can set up threat management systems, train employees, and offer ongoing advice and support. Some companies may also administer these types of systems remotely for their clients, applying their expertise and connections to keep systems up and running as much as possible. People who are interested in working in this area should be innovative, fast thinkers who are capable of remaining several steps ahead of any situation, anticipating issues before they emerge rather than reacting to them after the fact.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
By nony — On Aug 14, 2011

@David09 - I don’t think that’s the fault of the firewall. The network administrators can adjust those settings.

If they want to let email attachments get through they can change the settings to allow certain attachments (like zip files, which can’t do any harm in and of themselves) – or to let attachments from certain locations get through, like specific vendors.

The firewall has to be capable of maximum security, however, in order to function effectively.

By David09 — On Aug 13, 2011

We have a firewall in our company, as I’m sure that most businesses do. The one beef I have about firewalls is sometimes I think they are a little too secure. This is not necessarily the case with our system, but with some of our customers’ systems.

What I mean is that from time to time I need to send a customer an email attachment. Some firewalls will not let the zip attachments get through. They won't let a database attachment through either, for fear I suppose that the database could execute a macro which could disrupt the network.

I find that in order to get through the firewall, I have to rename the attachment’s extension to .txt (an innocuous text file, which cannot execute a program) to get it through the program.

By NathanG — On Aug 13, 2011

I took a course on network security in college. In addition to the stuff that the article talks about, like firewalls and virus scanners, there have been some really innovative developments in the area of network security.

One such system is called a honeypot. It's a network intrusion detection system. A honeypot is basically a bait. It emulates a real server on a network and it attracts hackers and repels their attempts at intrusion, keeping them away from the real network.

In addition, the honeypot also gathers information about the hackers so that it can build a better defense mechanism against them.

Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-threat-management.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.