> McAfee > Counter stealthy attacks - broad and deep visibility integrated with protection and response systems
 

Counter stealthy attacks - broad and deep visibility integrated with protection and response systems

White Paper Published By: McAfee
McAfee
Published:  Jul 24, 2013
Type:  White Paper

Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.



Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls, security, data management, business technology