Malware detection and prevention fundamentals

Malware detection and prevention fundamentals

Date: Jun 26, 2012

It's no secret that all organizations, regardless of size, need to prevent and detect malware at the network and host levels. The sophistication of malware, particularly bots, is growing rapidly, and the number and types of malware variants released is increasing, too. For midmarket companies, what's the best way to win this arms race with attackers? There are many considerations, and we'll cover the following in this videocast:

  • Malware basics, with details on some of the newer malware types and capabilities seen today
  • New detection and prevention tools such as whitelisting and application-aware firewalls
  • Differences in standalone antivirus gateways versus Unified Threat Management (UTM) systems, and new capabilities in system-level detection and prevention tools
  • The Pros and Cons of running anti-malware tools and handling malware-related incidents in-house versus outsourcing and leveraging consulting services

 

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Revitalizing endpoint security with VDI desktops

    VIDEO - Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren.
  • canderson

    Inside the NSA trusted computing strategy

    VIDEO - The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers.
  • social engineering

    Definition - Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  • Security Readers' Choice Awards 2014: Endpoint security products

    Feature - Readers vote on the best endpoint security products of 2014.
  • Identity of Things (IDoT)

    Definition - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • shadow app

    Definition - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
  • TailsOS

    Definition - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable storage medium. The operating system and associated applications run from the storage device.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: