Preventative security tools (ITSAP.00.058)

Alternate format: Preventative security tools (ITSAP.00.058) (PDF, 821 KB)

Preventative security tools provide important layers of protection for your networks and devices. Security tools can also help your organization reduce the risks associated with malicious intrusions, such as malware, spyware and unauthorized users.

On this page

Examples of preventative security tools

Each of these security tools target specific areas to help prevent security breaches from happening to your organization’s network and devices.

Firewalls are security barriers placed between two networks that control the amount and the kinds of traffic that may pass between them. They prevent the unauthorized flow of data from one area of a network to another through the following actions:

  • Monitor incoming and outgoing traffic, then filter out the known bad sources
  • Ensure downloaded data is part of a legitimate connection
  • Decrypt and analyze downloaded data to ensure there is no trace of malicious content before forwarding the data on to your network

Anti-virus software defends devices against malware through the following actions:

  • Scan files for viruses before they are downloaded to your device
  • Block known malicious software from downloading
  • Scan your system’s files against a list of known viruses to remove if detected

Virtual private networks (VPNs) are private communications networks (referred to as tunnels) through an untrusted network. A VPN is used to establish a secure connection with authentication and protected data traffic. It sends and receives data through an encrypted tunnel to prevent observations by threat actors. You can use it within your organization or between several different organizations to communicate over a wider network. For more details on VPN, refer to Virtual Private Networks (ITSAP.80.101).

Ad blockers are a type of browser extension software that blocks advertisements, such as webpage displays and pop-ups, from your system while you browse the web.

Virtualization is a technique that creates an isolated environment for specific applications to run on your device. Virtualization can be used for the following purposes to improve security:

  • Separate business and personal applications
  • Isolate different applications and processes for specific groups and business lines
  • Download malicious content for testing, using an isolated environment to prevent access to other applications

Application allow and deny lists are used to control which applications can run on a device. They can:

  • approve specific applications and application components to run on organizational systems
  • prevent users from installing unauthorized software

Anti-phishing software reports and blocks phishing emails to prevent attacks from occurring or spreading further through other recipients. You can use this software to prevent identity theft, credit card fraud and financial loss.

You should also follow Domain-based Message Authentication, Reporting, and Conformance (DMARC) policies to prevent phishers from using your organization’s domain to send spoof emails. These policies also authenticate domains to filter legitimate email domains from hidden phishing domains.

For more information on phishing prevention, refer to Spotting malicious email messages (ITSAP.00.100) and Don't take the bait: Recognize and avoid phishing attacks (ITSAP.00.101).

Cloud security subscriptions

Cloud security subscriptionscan provide protection services over your cloud network, data and accounts. These services may include security features, such as:

  • encryption and key management to protect your data
  • traffic filtering based on rules you create like blocking HTTP addresses and common attack patterns
  • detection of threatening network activity and account behaviour within your cloud environment
  • anti‑ransomware and anti-malware protection to prevent threat actors from stealing or damaging data

Cloud access security broker

Cloud access security broker(CASB)software solutions enforce your organization’s security policy by:

  • validating that the network traffic between your organization’s devices and the cloud provider complies with your organization’s security policies
  • detecting threats and monitoring sensitive data in transit

Artificial intelligence security tools

Artificial intelligence (AI) introduces a more efficient and accurate application of security tools. Machine learning algorithms allow AI to adapt to new threats and react in real-time. Many traditional security tools rely on signature or rule-based detection systems, which work only for known threats. In AI-based security tools, algorithms use training data to learn how to respond to different situations.

AI can improve security in the following ways:

  • Keep pace with emerging and unknown threats
  • Streamline response process by automating routine tasks
  • Log and analyse vast amounts of data
  • Limit the amount of ‘false positive’ threat results and improve detection rates

However, AI is not without its faults. It is subject to its own bias based on its training data and AI threat detections should always be complemented by human expertise. Data that AI is trained on may be inaccurate or illogical. It can be subject to tampering and misinformation. For more information on AI, see Artificial intelligence (ITSAP.00.040) and Generative artificial intelligence (AI) (ITSAP.00.041).

Unified threat management

Unified threat management (UTM) is a solution that incorporates multiple functions to address different types of threats. UTM often includes preventative security tools such as firewalls, VPNs, anti-phishing software, allow lists, and web content filtering. UTM analyzes content that enters the system to ensure it is clean before sending it to the user. UTM removes detected malicious content before the device accesses it and then sends a report to notify the user of the removal.

Additional security practices

Corporate security policies can help determine which of the preventative security tools described in this document are right for your organization. Although these security tools help reduce cyber security risks, there are still other ways for threat actors to gain access to your system. You should also implement the following security practices:

Learn more

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: