Network Security White Paper

Download Now Free registration required

Executive Summary

Business users are becoming more mobile and are using a wider variety of devices than ever before. While this makes for a more flexible and productive workforce, it also creates significant challenges to the security of corporate networks for businesses of all sizes. It's not just the increase in endpoints; it's what people are doing at the endpoints. Innovations such as social networks and cloud computing are opening up pathways to new security threats all the time. According to a recent article in The Washington Post, online attackers created more malware in 2009 than in the previous 20 years combined. And Google reported that in a single 18-month period, more than 3 million unique URLs on more than 180,000 websites were automatically installing malware.

At the same time the threats are increasing, so are the consequences of failing to adequately address those threats. According to a recent report by the Ponemon Institute, the average cost of a security attack among 45 companies studied was nearly $18,000 per day, including costs for detection, investigation, recovery and post-response operations. With each attack averaging 14 days to resolution, the total cost of a single attack on average was more than $252,000. Every company surveyed experienced some type of web-based attack during a sample four-week period, and approximately 80 percent encountered attacks from viruses, worms or Trojan horses.

With threats increasing and companies becoming more exposed, it is more important than ever that businesses of all sizes address network security with a comprehensive, coordinated and strategic approach to securing endpoints and the corporate network. This white paper examines the product strategies of four leading security companies: McAfee, Symantec, Trend Micro and Websense. The focus is on how each of them addresses security threats - including viruses, Trojan horses, spyware and rootkits - as part of an overall strategic approach to security for midsize and large enterprises.

  • Format: PDF
  • Size: 0 KB