Tools and Techniques for Eliminating Modern Malware
|
|
|
- Ami Merritt
- 9 years ago
- Views:
Transcription
1 The Essentials Series: Modern Malware Threats and Countermeasures Tools and Techniques for Eliminating Modern Malware sponsored by by Greg Shields
2 Tools and Techniques for Eliminating Modern Malware...1 Signature Limitations...1 Behavioral-Based Detection...2 Multiple Approaches Are Necessary...3 Kernel-Level Protection...3 Surgical Remediation...3 Pre-Boot Scanning...3 Executable-Layer Firewalls...4 Today s Anti-Malware Tools Must Be Sophisticated...4 i
3 Copyright Statement 2008 Realtimepublishers.com, Inc. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtimepublishers.com, Inc. (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtimepublishers.com, Inc or its web site sponsors. In no event shall Realtimepublishers.com, Inc. or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtimepublishers.com and the Realtimepublishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtimepublishers.com, please contact us via at [email protected]. ii
4 Tools and Techniques for Eliminating Modern Malware The first article in this series talked about the classifications of malware seen in today s modern landscape. There, we discussed the economics of malware and how those financial forces are driving the underground malware industry towards more efficient and effective use of malware for dollar gain. Following on, the second article discussed the advanced behaviors seen in those sophisticated malware packages, focusing on a few high-impact techniques that malware authors use today to hide the presence of their wares while they accomplish their mission. In this, the final part of this series, the focus is on getting rid of these ever-evolving little buggers all across the business IT environment. With extortion and financial gain a primary motivator for malware creators, you need to keep malware away from your IT environment more than ever before. Signature Limitations There is a problem with the traditional model for locating malware on a candidate computer. This model has historically relied on a signature-based approach for locating the breadcrumbs of malware s presence on an infected system. Signature-based solutions have been moderately successful in the past due to their fast ability to compare known malware characteristics files, registry keys, or code snippets patched into files. But in the war between the malware developers and those on the anti-malware side, a number of significant software architecture improvements have been developed by the bad guys that make signature-based detections less effective than before. As discussed in the second article in this series, a new software architecture found in many sophisticated malware packages is the addition of randomization to their compiling, installation, and sometimes even their regular processing. These randomization features change the way the malware looks over time. Much like a biological virus adapts to the attacks brought on by its host, the process of morphing malware s core code changes the characteristics that are used to categorize and identify it. When malware no longer looks like what a signature says it should, the signature no longer works for identification. This failure associated with the signature-based approach illustrates a critical weakness in its core workflow. In order for a signature to work, a developer needs to find a copy of the new malware. They then need to reverse-engineer that software code to find the pieces that can be uniquely identified. Once uniqueness elements are indentified, the developer then needs to codify the results into a signature that is later distributed to servers and clients. The weakness in this process has to do with the effort and timing required to get from initial detection through reverse engineering to signature distribution. This signature-based identification is highly work-intensive for an anti-malware industry that is exceptionally timedependent. In an environment in which malware authors are constantly changing their tactics and code is morphing into new and unrecognizable forms, anti-malware companies find themselves with more work and less time. 1
5 Behavioral-Based Detection What s interesting about all forms of malware no matter their vector of infection, payload, or signature is that virtually all forms of malware tend to aim towards achieving one of a limited set of goals. Financial gain is the primary goal of today s malware; additional goals tend to be one or more of the following: Data destruction The wholesale removal of data on a system Data disclosure This can include personal/financial data, username/password data, or configuration data for espionage purposes Redirection Changing the behavior of a system or application to perform some other function, such as switching a user to an alternative Web site Surveillance Spying on the activities of a user, usually to reach one of the previously mentioned goals Thus, because the mechanisms for malware installation and processing are many while the goals are few, a different architecture for malware identification may be superior. Behavioral-based detection is that alternative architecture. Consider the anti-malware clients that may already be installed onto servers and desktops in your environment. They are currently configured to repeatedly scan the system and running processes for the presence of software that looks like known malware. Signature updates are a daily and sometimes hourly occurrence to keep up-to-date. Now consider a reconfiguration of that software to instead look for any processing whatsoever on systems where that processing attempts to accomplish one of the behaviors identified previously. In this situation, it can be significantly easier to code an anti-malware client that is always looking for certain types of behaviors. No matter how often or how much malware morphs in an attempt to evade detection, any time it attempts to accomplish its mission, that nefarious activity will be sensed by the client and prevented. It is similarly possible for clients to track the source of the inappropriate activity and begin remediation activities such as removal. Because the offending process can be more easily identified, removal can be more quickly completed. Should the correct removal procedures not be present on the system to initiate the removal, the computer remains partially protected while the bad behavior remains inhibited by the client. 2
6 Multiple Approaches Are Necessary Not stated to this point is the necessity of multiple approaches towards resolving identification and removal requirements. Although the behavior-based approach may be superior for identifying and preventing bad behavior from occurring on the client, the signature-based approach may be better for actually identifying and removing the specific malware class and instance. Anti-malware products that incorporate multiple approaches will by default have more vision into the inner workings of servers and desktops than those with single approaches alone. A few additional technologies that tack on to both of these approaches are similarly necessary for the environment that wants to get the most bang out of their anti-malware client dollar. Consider the following additional new methodologies that can take the identification and removal processes even further. Kernel-Level Protection From a software-layer perspective, the closer that anti-malware products can get to the kernel, the more likely they will have the ability to identify malware activity as it occurs on the system. When malware (rootkits being a perfect example) manages to shim itself between any antimalware engine and the kernel, it is difficult or impossible for the anti-malware scanning engine to locate that bad code. Conversely, when anti-malware software operates at a layer directly atop the kernel, it retains the ability to see all inputs and outputs as they pass. Obviously, with the changes to the kernel with the release of Windows Vista and Windows Server 2008, this level of driver development must occur with the inclusion of Microsoft itself. Surgical Remediation If a malware removal tool you ve attempted to use has ever resulted in the crash of the infected system, you re familiar with the need for highly tailored removal capabilities once malware has been found. When the removal process goes too far in what it eliminates from the system, to the point where the system is no longer stable, the removal system or the scripts used to instruct it are ineffective. Surgical remediation allows an anti-malware removal system to remove not only the files and registry keys where malware code has infiltrated but also the specific patches to system files. The result here is an IT environment that can easily survive an infection incident with little risk to desktop and server operations. Pre-Boot Scanning Rootkits are particularly difficult due to the way they infiltrate themselves into the file system and subsequently cloak their presence. One resolution with finding installed rootkits on systems when all other options fail is to look at that file system from two different perspectives. The first perspective is from the file system itself. The second is from a dismounted instance of the file system. When the file system is dismounted, the mechanisms described in article two of this series cannot function to enable the cloaking effect. By looking at the differences in results from each of these two scans, any difference found must be a set of code that has attempted to cloak itself. Using pre-boot scanning on what is effectively a dismounted file system enables the second of these two needed scans. 3
7 Executable-Layer Firewalls Lastly, the Windows OS by default has no logic to determine what processes should and should not be executed on the system. Thus, any process that attempts to gain processor attention for execution will be run. Needed in many environments is a type of executable-based firewall on the system itself. This firewall enables administrators to identify the processes that should be run on systems. Processes that don t belong in the environment are forbidden from running. This onsystem firewall helps prevent certain types of malware from executing on system when they aren t part of the white list of accepted programs. It also serves the secondary purpose of preventing legitimate but inappropriate and potentially risky applications from being run on company hardware such as file swapping applications, games, or other applications that can lead to a down-the-road infection. Today s Anti-Malware Tools Must Be Sophisticated The reason for this need of sophistication has been stated over and over in this article series: Malware itself is growing ever more sophisticated every day. For IT environments that have had success in the past using traditional troubleshooting tools, the naked eye, and the fix it after it breaks approach, new tools must be brought into place that prevent problems before they happen. The anti-malware tools of yesterday, installed and run only after an event occurs, are no longer the best practice for proactive IT environments. Necessary are always-on alternatives that leverage multiple mechanisms for finding malware in all its categories and behaviors for the protection of the IT environment as a whole. 4
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
Account Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
The Shortcut Guide To. Architecting iscsi Storage for Microsoft Hyper-V. Greg Shields
tm The Shortcut Guide To Architecting iscsi Storage for Microsoft Hyper-V Ch apter 2: Creating Highly Available Hyper V with iscsi Storage... 16 Th e Windows iscsi Initiator: A Primer... 17 NIC Teaming...
Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.
Situation Microsoft IT had limited monitoring and reporting functionality with its existing antimalware system. Although the system could scan for malware, there was no reporting capability or configurable
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions Todd Schell [email protected] Director, Product Engineering CoreTrace TM December 2008 Today s Endpoint Control Challenges
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Desktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
The Shortcut Guide To. Implementing Virtualization in the Small Environment. Greg Shields
tm The Shortcut Guide To Implementing Virtualization in the Small Environment Greg Shields Ch apter 2: What Business Benefits Will I Recognize from Implementing Virtualization?... 16 Why Should My Budget
Email Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
Automating Windows 7 Installation for Desktop and VDI Environments
Automating Windows 7 Installation for Desktop and VDI Environments Greg Shields Ch apter 8: Integrating Automated Windows 7 Installation into VDI Environments... 122 Ste p Fifteen: Integrating MDT into
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Active Threat Control
Active Threat Control Proactive Protection Against New and Emerging Threats Why You Should Read this White Paper The unprecedented rise of new threats has deemed traditional security mechanisms both ineffective
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
