sponsored by Trusteer
Posted:  19 Jul 2012
Published:  19 Jul 2012
Format:  PDF
Length:  16  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

Targeted attacks by organized crime and state-sponsored cyber terrorism drive IT security to establish a layered defense against advanced malware and APT. At the same time, cloud applications, desktop virtualization and BYOD initiatives require security organizations to protect devices, applications and data that they no longer control. And, financial institutions face the risk of financial fraud perpetrated from employee machines, by manipulating internal controls.

Dr. Chenxi Wang, Vice President of Security and Risk at Forrester Research discusses how emerging threats and strategic IT initiatives challenge existing security architectures in this presentation transcript. Specifically, how advanced malware evades legacy security controls and enables cybercriminals to infiltrate the organization via user endpoints. Chenxi will review the key principles IT security should consider when adapting their defense to address the new threats and extending protection beyond the traditional data center boundaries.

Yaron Dycian, Trusteer’s VP of Products, will demonstrate an advanced malware attack using a Remote Access Trojan (RAT). Yaron will review how Trusteer’s solutions enabled a Global 1000 company to secure its workforce access to VPN and virtual desktops, from unmanaged devices, against malware attacks.

Read on to learn:

  • How today’s targeted attack increase the risk of data breach, but at the same time, strategic IT initiatives like cloud, virtualization and BYOD challenge the data protection task
  • What are the key requirements IT security professionals and executives should consider to address the change in risk and attack vectors
  • How commercial malware can be delivered into enterprise endpoints and used to execute a data breach 
  • What practical solutions organizations could use to protect their workforce against advanced malware on both managed and unmanaged devices





BROWSE RELATED RESOURCES
Endpoint Security | Malware | Mobile Device Management | Security Infrastructure | Security Policies | Security Threats | Virtualization Security

View All Resources sponsored by Trusteer

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement