Malware And Trojans And Bots, Oh My!
Stop Chasing Malware Flavor Of The Month, Start Planning Strategically
February 28, 2011
Why Read This Report
2010 was an exciting year on the malware calendar — the year that brought us Operation Aurora, Zeus, and Stuxnet. Malware is now a widespread problem for both consumers and businesses. Security vendors not surprisingly are jumping on the bandwagon to promote a threat-centric hype, in an effort to persuade you to buy their latest malware-defending products. To truly secure your organization against some of the most insidious malware threats, security professionals must stop chasing the malware flavor of the month. Instead, plan a strategy that will strengthen your fundamental defense DNA. This includes implementing advanced threat analytics, building an attack-tolerant security architecture, and managing security risks upstream to consumers and downstream to suppliers.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- Research Catalyst
- Consumer-Facing Malware Threatens Online Commerce
- Business Malware Aims For Disruption And Your Crown Jewels
- It's Time To Look Beyond Malware
- Use Malware Defense As A Catalyst To A Better Security Strategy
- Related Research Documents
Application Control: An Essential Endpoint Security Component
September 7, 2012 | Chenxi Wang
An S&R Pro's Guide To Windows 8.1 Security
November 8, 2013 | Chris Sherman
Application Security: 2011 And Beyond
April 12, 2011 | Chenxi Wang