Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops

Cover Image

Targeted attacks by organized crime and state-sponsored cyber terrorism drive IT security to establish a layered defense against advanced malware and APT. At the same time, cloud applications, desktop virtualization and BYOD initiatives require security organizations to protect devices, applications and data that they no longer control. And, financial institutions face the risk of financial fraud perpetrated from employee machines, by manipulating internal controls.

Dr. Chenxi Wang, Vice President of Security and Risk at Forrester Research discusses how emerging threats and strategic IT initiatives challenge existing security architectures in this presentation transcript. Specifically, how advanced malware evades legacy security controls and enables cybercriminals to infiltrate the organization via user endpoints. Chenxi will review the key principles IT security should consider when adapting their defense to address the new threats and extending protection beyond the traditional data center boundaries.

Yaron Dycian, Trusteer’s VP of Products, will demonstrate an advanced malware attack using a Remote Access Trojan (RAT). Yaron will review how Trusteer’s solutions enabled a Global 1000 company to secure its workforce access to VPN and virtual desktops, from unmanaged devices, against malware attacks.

Read on to learn:

  • How today’s targeted attack increase the risk of data breach, but at the same time, strategic IT initiatives like cloud, virtualization and BYOD challenge the data protection task
  • What are the key requirements IT security professionals and executives should consider to address the change in risk and attack vectors
  • How commercial malware can be delivered into enterprise endpoints and used to execute a data breach 
  • What practical solutions organizations could use to protect their workforce against advanced malware on both managed and unmanaged devices
Vendor:
Trusteer
Posted:
Feb 8, 2021
Published:
Jul 19, 2012
Format:
PDF
Type:
Presentation Transcript
Already a Bitpipe member? Log in here

Download this Presentation Transcript!