Business Intelligence

Comprehensive Endpoint Security

Download Now Free registration required

Executive Summary

Off late malicious activity on the Internet has advanced from worms and viruses attacking random computers in the wild, to the highly sophisticated and targeted attacks - such as the TJ Maxx and Heartland data breaches - that plague enterprises today. Individual hackers have been replaced by well-organized and globally dispersed criminal enterprises, motivated by easy and difficult-to-trace illicit financial gains. Valuable data, e.g. personal identity and consumer credit card information, is stolen from target organizations such as retailers, data processing facilities and government entities, and quickly sold to the highest bidder through global online clearing houses.

  • Format: PDF
  • Size: 127.53 KB