Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops


Targeted attacks by organized crime and state-sponsored cyber terrorism drive IT security to establish a layered defense against advanced malware and APT. At the same time, cloud applications, desktop virtualization and BYOD initiatives require security organizations to protect devices, applications and data that they no longer control. And, financial institutions face the risk of financial fraud perpetrated from employee machines, by manipulating internal controls.

Dr. Chenxi Wang, Vice President of Security and Risk at Forrester Research discusses how emerging threats and strategic IT initiatives challenge existing security architectures in this presentation transcript. Specifically, how advanced malware evades legacy security controls and enables cybercriminals to infiltrate the organization via user endpoints. Chenxi will review the key principles IT security should consider when adapting their defense to address the new threats and extending protection beyond the traditional data center boundaries.

Yaron Dycian, Trusteer’s VP of Products, will demonstrate an advanced malware attack using a Remote Access Trojan (RAT). Yaron will review how Trusteer’s solutions enabled a Global 1000 company to secure its workforce access to VPN and virtual desktops, from unmanaged devices, against malware attacks.

Read on to learn:

  • How today’s targeted attack increase the risk of data breach, but at the same time, strategic IT initiatives like cloud, virtualization and BYOD challenge the data protection task
  • What are the key requirements IT security professionals and executives should consider to address the change in risk and attack vectors
  • How commercial malware can be delivered into enterprise endpoints and used to execute a data breach 
  • What practical solutions organizations could use to protect their workforce against advanced malware on both managed and unmanaged devices
19 Jul 2012
19 Jul 2012
16 Page(s)
Presentation Transcript
Already a Bitpipe member? Login here

Download this Presentation Transcript!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.