HIT Consultant Insightful coverage of healthcare innovation
 

advanced malware

Results 76 - 100 of 117Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes through the best methods of malware protection.
Tags : 
    
Cisco
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection
    
Intel Security
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : 
mobile malware, mobile usage, mobile security, cybercrime
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Protecting endpoints
Tags : 
enterprise, malware, tools, data
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: Cisco     Published Date: Nov 17, 2014
This document will identify the key questions you should ask your advanced malware protection vendor, and show you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware, cisco, collective intelligence, big data, traditional defenses
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how Cisco® Advanced Malware Protection (AMP) is the integrated solution that provides visibility into potential threat activity and the control to rapidly contain and remediate malware.
Tags : 
cisco, malware protection, amp, advanced malware protection, global threat intelligence
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints, mobile devices, virtual environments
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
Damballa
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.