Detecting dangerous PDFs and application layer threats.

Share this article:
Detecting dangerous PDFs and application layer threats.
Detecting dangerous PDFs and application layer threats.

Click here to view on demand.

Malware making use of PDF files is one of many complex threats that are “moving up the stack” to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to detect and remediate these advanced threats.  

Learn how new application monitoring technology works with security information and event management (SIEM) systems to uncover and address these new high layer challenges.

Featured speakers
Mel Shakir, Chief Technology Officer, NitroSecurity

Jeremy Conway, Product Manager, NitroSecurity


Sponsored by  

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Vendor Webcasts

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Top four recommendations to enhance your data security strategy

As the volumes of data in organizations continue to surge, being able to effectively protect sensitive information is becoming increasingly difficult.

Tapping global threat intelligence to secure enterprise networks

On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector