Access "Antimalware product suites: Understanding capabilities and limitations"
This article is part of the October 2011 issue of Spotlight on top security trends of 2011 and Security 7 award winners
Protecting endpoint computers from malware is critical to providing reliable operations, safeguarding data and maintaining an acceptable compliance posture. Standalone antivirus products of the past have matured to encompass a variety of tools for securing endpoints in an enterprise setting. As the threats associated with malicious software increase in sophistication, so do the capabilities of antimalware tools. Understanding the capabilities and limitations of components that form an enterprise antimalware suite is critical to selecting the right product for your organization and deriving value from it. One way to understand what components we can expect to find in an antimalware product suite is to consider how malicious software often propagates: Through the victim’s browser Via email in the form of malicious links and attachments Through local network and removable media Via exploits and social engineering tricks An antimalware product suite should tackle all these infection vectors, attempting to stop malware before it begins running on the protected ... Access >>>
Premium Content for Free.
Winners of the 2011 Security 7 Award have their say
by Inforamtion Security Staff
Hear from the winners of this year's Information Security magazine Security 7 Award.
Breaches prompt call for certificate authority architecture alternatives
by Robert Westervelt
The breaches of certificate authorities fuel renewed debate for Internet security alternatives.
- Winners of the 2011 Security 7 Award have their say by Inforamtion Security Staff
Antimalware product suites: Understanding capabilities and limitations
by Lenny Zeltser
Traditional antivirus tools have matured into multi-featured antimalware suites. Here’s what you should know when shopping for endpoint protection.
- Antimalware product suites: Understanding capabilities and limitations by Lenny Zeltser
Security 7 Award: Seven security standouts
by Marcia Savage
This year’s Security 7 Award winners represent a bright spot in an industry beset by bad news.
Determining the value of infosec certifications
by Lee Kushner
An InfoSec Leaders survey examines the impact of different certs on the security profession.
Medical device security: Does IEC 80001 go far enough?
by Joseph Granneman
Networked medical devices introduce new risks but does a new standard go far enough in addressing the problem?
- Security 7 Award: Seven security standouts by Marcia Savage
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...