Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops

Cover

Targeted attacks by organized crime and state-sponsored cyber terrorism drive IT security to establish a layered defense against advanced malware and APT. At the same time, cloud applications, desktop virtualization and BYOD initiatives require security organizations to protect devices, applications and data that they no longer control. And, financial institutions face the risk of financial fraud perpetrated from employee machines, by manipulating internal controls.

Dr. Chenxi Wang, Vice President of Security and Risk at Forrester Research discusses how emerging threats and strategic IT initiatives challenge existing security architectures in this presentation transcript. Specifically, how advanced malware evades legacy security controls and enables cybercriminals to infiltrate the organization via user endpoints. Chenxi will review the key principles IT security should consider when adapting their defense to address the new threats and extending protection beyond the traditional data center boundaries.

Yaron Dycian, Trusteer’s VP of Products, will demonstrate an advanced malware attack using a Remote Access Trojan (RAT). Yaron will review how Trusteer’s solutions enabled a Global 1000 company to secure its workforce access to VPN and virtual desktops, from unmanaged devices, against malware attacks.

Read on to learn:

  • How today’s targeted attack increase the risk of data breach, but at the same time, strategic IT initiatives like cloud, virtualization and BYOD challenge the data protection task
  • What are the key requirements IT security professionals and executives should consider to address the change in risk and attack vectors
  • How commercial malware can be delivered into enterprise endpoints and used to execute a data breach 
  • What practical solutions organizations could use to protect their workforce against advanced malware on both managed and unmanaged devices
Vendor:
Trusteer
Posted:
19 Jul 2012
Published:
19 Jul 2012
Format:
PDF
Length:
16 Page(s)
Type:
Presentation Transcript
Language:
English
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy