RSS feed Get our RSS feed

News by Topic

Counter stealthy attacks - broad and deep visibility integrated with protection and response systems

By: McAfee
McAfee

Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.

Tags : stealthy attacks, malware, intrusion prevention system, siem, layered security controls, security
 Email this page
Published:  Jul 24, 2013
Type:  White Paper