Skip to content
Home > McAfee > Protect Your Systems from Stealth Attacks
 

Protect Your Systems from Stealth Attacks

White Paper Published By: McAfee
McAfee
Published:  Feb 06, 2013
Type:  White Paper
Length:  4 pages

The most menacing type of cyberattack is invisible. Using sophisticated techniques to hide its presence, a stealth attack may operate outside of the OS or move dynamically across endpoints to conceal the attackers’ actions. The risk to enterprises is real, with high-profile attacks such as Operation High Roller impacting companies around the globe. Traditional antivirus or intrusion prevention systems are no match for this new breed of attack; instead, enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.



Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security

Find Research