Close the Zero-Hour Gap: Protection from Emerging Virus Threats
sponsored by Proofpoint, Inc.

Today's malware distributors skirt traditional defenses by exploiting the "zero hour gap," the time it takes to identify the attacking malware and write signatures that can detect and neutralize it. Recent studies have shown the lag time or gap between when a virus is recognized and a signature written to combat it can range from several hours to more than one day.

To exploit this gap, virus writers have taken to using several new distribution strategies--so-called short-span attacks and serial-variant attacks. Sometimes they use a combination of both.

Read this whitepaper from Proofpoint to learn:

  • Why the need for signature-independent outbreak protection is more important than ever.
  • The latest advances in email security, network traffic analysis and recurrent pattern detection.
  • How Proofpoint Zero-Hour Anti-Virus technology protects enterprises against new viral outbreaks within minutes of their introduction.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Proofpoint, Inc.
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement