The results of PwC’s annual Global Information Security Survey indicate that companies are
confident in their efforts to secure systems, information, and privacy. Strategies and
personnel are in place, they say, and processes and technology are humming along. The
number of incidents reported seems manageable. Read more.
Webroot commissioned Forrester Consulting to conduct a survey study of 161 North American and European IT security decision-makers. The purpose of the study is to understand the current state of endpoint security strategies across enterprises and SMBs, as well as identify key trends and market directions for endpoint security. This study took a detailed look at how organisations deploy endpoint security products, their common practices, pain points, and challenges.
Face it, your current endpoint security software is slow, heavy and you
wonder if it causes more problems than it solves. Meanwhile you have to
keep up with a number of new challenges — from a more mobile workforce
to more malicious malware. Read more.
The not-for-profit Royal Flying Doctor Service Western Operations (RFDSWO) provides a 24-hour health lifeline for people living, working or travelling in rural and remote areas of Western Australia and the Indian Ocean Territories. However, monitoring and managing the Internet security for the 250 desktop and laptop computers used by shift workers 24-hours a day every day of the year was a challenge
for the tightly resourced organisation. Read more.
With the exponential growth and sophistication of malware today, the security industry can no
longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security
protection is now ineffective due to the sheer volume, quality, and complexity of malware.
This paper looks at this problem and how Webroot, by going back to the drawing board on countering
malware threats, is revolutionisng endpoint protection and solving the issues that hinder existing
endpoint security solutions.
The Royal Flying Doctor Service Western Operations (RFDSWO) provides a 24-hour emergency service to those who live, work, and travel in rural and remote areas of Western Australia (WA) and the Indian Ocean Territories. As a staff benefit, RFDSWO allows staff to use their computers for both corporate and personal use. This unrestricted access has the potential to leave the 302 desktops and laptops shared among 430 staff, exposed to more threats and infections than in a typical corporate environment. Read more.
Endpoint Protection offers a revolutionary approach to endpoint malware protection. It brings
together innovative file pattern and behaviour recognition technology with the power of cloud computing to stop known threats and prevent unknown zero-day attacks more effectively than anyone else. Read more.
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
When it comes to protecting enterprise data, CIOs and CSOs are at a crossroads. The complexity and prevalence of security threats continue to grow, bolstered by consumer IT and mobility. The business requires and expects total freedom and choice in technology, yet risks come from any number of places: users at their desks, users working from many different mobile devices and unsecured networks, and users downloading applications at will from the Web. Hackers still have many more opportunities to grab enterprise data and are getting smarter by the day. Given the pace of change in our Web-based mobile world, who knows what next month will bring? To learn more read on.
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.