August 13, 2014

Secure Beyond the Signature

For years, signature-based security alone provided fast, reliable protection from most known attacks, but hackers have learned to avoid easily identified attacks with tactics that are stealthy, evasive, defense-aware, and intelligently adaptive. Signature-based detection provides an important foundation for intrusion inspection but clearly, something more must be done. Malware attacks can be identified and stopped with high levels of accuracy and reliability by layering three types of analytical techniques over a conventional signature-based defense. This analysis explains how attacks can occur--  and how to prevent them.

  • Download Paper
  • More resources from McAfee

  • Leave a comment

    Get E-News and Notices via Email




    I accept Webtorials' Terms and Conditions.

    Trending Discussions

    Featured Sponsor Microsites

    Recent Tweets



    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.