HR Hero Your Employment Law Resource
 

Counter stealthy attacks - broad and deep visibility integrated with protection and response systems

White Paper Published By: McAfee
McAfee
Published:  Jul 24, 2013
Type:  White Paper

Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.



Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.