Malware detection and prevention fundamentals

Malware detection and prevention fundamentals

Date: Jun 26, 2012

It's no secret that all organizations, regardless of size, need to prevent and detect malware at the network and host levels. The sophistication of malware, particularly bots, is growing rapidly, and the number and types of malware variants released is increasing, too. For midmarket companies, what's the best way to win this arms race with attackers? There are many considerations, and we'll cover the following in this videocast:

  • Malware basics, with details on some of the newer malware types and capabilities seen today
  • New detection and prevention tools such as whitelisting and application-aware firewalls
  • Differences in standalone antivirus gateways versus Unified Threat Management (UTM) systems, and new capabilities in system-level detection and prevention tools
  • The Pros and Cons of running anti-malware tools and handling malware-related incidents in-house versus outsourcing and leveraging consulting services

 

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Revitalizing endpoint security with VDI desktops

    VIDEO - Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren.
  • canderson

    Inside the NSA trusted computing strategy

    VIDEO - The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers.
  • Identity of Things (IDoT)

    Definition - The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet. IDoT is an essential component of the Internet of Things (IoT), in which almost anything imaginable can be addressed and networked for exchange of data online.
  • shadow app

    Definition - Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and collaboration (UCC) applications that enable greater productivity in the office.
  • TailsOS

    Definition - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable storage medium. The operating system and associated applications run from the storage device.
  • SmartScreen

    Definition - SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7's Internet Explorer 8, SmartScreen uses a whitelist of trusted sites collected from the surfing data of other IE SmartScreen users.
  • Mobile security market moves away from FUD

    News - Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.

    ( Jul 02, 2014 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: