Sponsored By

Sign in to follow this  
Peaches

Layering Up For Malware Protection

Recommended Posts

</h2>

<h2>Layering Up For Malware Protection

No one layer of threat detection technology can sufficiently protect the enterprise today from malicious code—a look at five best practices

As malware has become one of the largest threats to organizations, single offerings can't keep up with all threats and protect organizations. A layered approach—although not foolproof—to protecting your organization from data theft, identity theft, and intrusion, provides the best results

The most cost-effective method of preventing and detecting this type of malware is a Web filter. Using an open-source system such as Squid, or purchasing an enterprise offering from Barracuda, Websense, Webroot, or others provides the ability to block known malware distribution sites and in some cases, analyze traffic for malicious content, such with M86's offering. Some tools let you provide filtering to your users even when they are off the corporate network.

Mobile phones are the newest target for attackers. Always on, always connected, and lacking security controls, these are an attacker's dream. Some platforms, such as BlackBerry, are closed and designed to be secure. The iPhone is a closed platform, but users can jailbreak it and decrease the security. The Android line of devices is considered to be the most open and also regarded as having the most risk. Products such as Lookout, Zenprise, and MobileIron provide security features and management for phones.

Details here: http://www.darkreading.com/vulnerability-management/167901026/security/antivirus/229100009/tech-insight-layering-up-for-malware-protection.html

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this