Πελάτης: Blackberry Cylance
Μορφή: Ηλεκτρονικό βιβλίο
Μέγεθος: 200 KB
Γλώσσα: Αγγλικά
Ημερομηνία: 06.02.2020

Replacing Legacy AV - Benefits of the BlackBerry Cylance Approach

Legacy antivirus solutions are built upon several outmoded technologies ranging from byte-matching to post execution behavioral analysis. Threat actors have adapted to these well-known cybersecurity measures and responded with increasingly sophisticated attacks. For example, using byte-matching to identify malware has been foiled by attackers implementing polymorphic, single-use, and fileless attacks. Post-execution behavioral analysis is too risky of an approach when modern ransomware may encrypt vital data before malicious activity is detected.

Many traditional AV companies respond to evolving cyber threats by implementing additional layers of protection. This approach is a double-edged sword as new security controls demand additional system resources. While the impact of a single security layer may be negligible, the accumulation of multiple layers creates considerable overhead that negatively effects productivity.

Δωρεάν λήψη
Εισαγάγετε τα δικά σας στοιχεία επικοινωνίας και κάντε κλικ στο κουμπί λήψης. Θα λάβετε ένα email μαζί με τον σύνδεσμο λήψης.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • Blackberry Cylance
Τα πεδία που σημειώνονται με * είναι υποχρεωτικά