Quantcast

Lumension Explains The Role Of Application Control In A Zero-Day Reality

March 15, 2011

Webcast will discuss how organizations can effectively prevent zero-day attacks with application whitelisting

Scottsdale, AZ (Vocus/PRWEB) March 14, 2011

In today’s always-on, Web 2.0-connected organizational environment, end users often download unwanted and unknown applications with little concern for potential risk. Coupled with the fact that around 1.6 million new malware signatures are appearing every month and a rising tide of zero-day attacks, IT managers need to raise their defensive strategy. While traditional endpoint security solutions are designed to deal with known attack vectors, there is no signature for zero-day threats. This lack of adequate defense in an increasingly malicious environment is what led Lumension, a global leader in endpoint management and security, and Infosecurity to sponsor a webcast titled “The Role of Application Control in a Zero-Day Reality.”

The webcast will be led by Richard Stiennon, author of Surviving Cyberwar and Chief Research Analyst at IT-Harvest, along with Paul Zimski, Vice President of Solution Strategy at Lumension. Stiennon and Zimski will discuss how application control, also known as whitelisting, allows organizations to block unknown and unauthorized applications from executing by default ““ preventing zero-day attacks automatically. While application control has traditionally been used more in static environments, it has evolved to provide IT and end users with the necessary flexibility in even the most dynamic endpoint environments, improving security without impacting productivity. Specifically, Stiennon and Zimski will focus on:

  •     Why application control is a central plank of security planning
  •     How to beat zero-day vulnerabilities
  •     Why regular IT security reviews and analyses are critical in today’s digital defenses

“IT managers simply can no longer win with traditional IT security solutions, such as standalone signature-based antivirus,” said Stiennon. “The issue with zero-day exploits is that there is no signature; thus, when end users knowingly or unknowingly download a malicious application, traditional tools have no chance to catch it. We are aiming to educate IT managers, along with anyone who wants to better understand this technology, on how to arm their networks so that they can be better equipped to prevent these increasingly common attacks.”

This webcast is intended for:

  •     IT professionals wanting to better understand the security issues that zero-day vulnerabilities now pose
  •     Managers looking to get up to speed on this increasingly important security issue
  •     IT workers looking to better protect their IT resources
  •     Anyone wanting to understand the nature of application control/whitelisting

The webcast will take place on Wed., March 23 at 10:00 a.m. EST. Register for this webcast here: The Role of Application Control in a Zero-Day Reality

Supporting Resources:

About Lumension Security, Inc.

Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24×7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia, and Singapore. Lumension: IT Secured. Success Optimized.â“¢ More information can be found at lumension.com.

Lumension, the Lumension logo, are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.

###

For the original version on PRWeb visit: http://www.prweb.com/releases/prweb2011/3/prweb8200732.htm


Source: prweb



comments powered by Disqus