Currently Being Moderated

Managing the Changing IT Landscape: Securing the Enterprise 

                                                              

As I read industry press and blogs today, I’ve noticed that the topic of IT security can get a bad rap. It’s often positioned as the reason why IT can’t do something, regardless of the potential business benefits. Opportunities for IT to enable business agility and productivity are powerful forces for innovation—yet they've ratcheted up the risk level. Protecting business data has become much harder, especially within an ever-growing threat landscape.

 

Consider this: In 2012, new malware samples grew by 50 percent compared to 2011, while mobile malware increased by 44 times what it was. Plus there’s an increase in kernel-mode rootkits, a new type of attack that can hide, making it even harder to protect data and devices. The stakes are high, and traditional software-based security simply isn't going to cut it. 

 

But these risks don't have to spell disaster. McAfee* Deep Defender* software is an innovative solution designed to detect and stop kernel-based attacks that traditional software solutions can’t even detect. And in Intel’s case, it worked. I recently listened to Intel IT’s podcast on Deep Defender software that described their 10-week pilot of the solution. The Deep Defender solution works directly with Intel® Virtualization Technology to monitor kernel memory in real time, even before the operating system boots. During the pilot, there were three malware instances detected (across 300 devices), and each instance included zero-day malware that exposed a previously undetected vulnerability.

 

Visit the Intel IT Center for additional insights on endpoint security and check out the new McAfee Complete Endpoint Protection solutions released just last week.

 

How does your organization protect against stealthy threats? Have you had to rethink your IT security infrastructure to address these new threats?

 

Chris

@chris_p_intel
#Consumerization #StealthyThreats #DeepDefender

More in the IT Center  

Comments

Filter Blog

By author:
By date:
By tag: