How to Protect Your Enterprise from Malicious Data Attacks such as Zeus and Man In the Browser

IT teams are being tasked with two directly competing objectives: make information widely available to authorized users and keep that data protected. While data-at-rest and data-in-motion is protected with traditional protection such as firewalls, secure data centers and, encryption, SSL and VPN, data-in-use (both trusted and untrusted endpoints) remains a key area of vulnerability. Attacks from Zeus Trojan and its variants have circumvented traditional security measures. This paper explores the latest advances in information protection technology which enables secure remote access and protects sensitive corporate data while in use.

Provided by: Wontok Topic: Security Date Added: Feb 2012 Format: PDF

Read more

Find By Topic