Detecting dangerous PDFs and application layer threats.

Share this article:
Detecting dangerous PDFs and application layer threats.
Detecting dangerous PDFs and application layer threats.

Click here to view on demand.

Malware making use of PDF files is one of many complex threats that are “moving up the stack” to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to detect and remediate these advanced threats.  

Learn how new application monitoring technology works with security information and event management (SIEM) systems to uncover and address these new high layer challenges.

Featured speakers
Mel Shakir, Chief Technology Officer, NitroSecurity

Jeremy Conway, Product Manager, NitroSecurity


Sponsored by  

Share this article:

Sign up to our newsletters

More in Vendor Webcasts

The NIST Framework: The Public's Stake in the Cybersecurity of our Critical ...

The announcement in February 2014 by the White House of a Framework for the development of cybersecurity standards follows the announcement one year earlier by the White House of a Presidential Executive Order describing the Government's overall policy toward the cybersecurity on our nation's critical ...

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Addressing Identity and Access Management with a Unified Open source Identity and ...

Many IT organizations today are tasked to manage a complex landscape that includes a mix of SaaS applications and on-premise applications being accessed by various user populations; employees, customers, mobile workers, etc.