The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

Share this article:
The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security
The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

Click here to register for FREE!


Date:
Tuesday April 5th 2011
Time: 2:00 p.m. ET/11:00 a.m. PT

Today, more than 1.6 million new malware signatures are identified each month. And more organizations are falling prey to “zero-day” attacks – malware for which an anti-virus signature does not exist. It's no surprise that roughly half of the organizations surveyed in a 2010 Ponemon Institute study reported an increase in their IT operating expenses - a main driver of that cost increase was malware. Traditional anti-virus simply can't keep up in the malware arms race and relying on it as your primary defense will prove costly.

In this webcast, Paul Henry, security and forensics expert, and Chris Merritt, Director of Solution Marketing with Lumension, will examine:

  • The true cost of anti-virus in terms of PC performance, network bandwidth, IT helpdesk costs, prevention of malware and more
  • Why application whitelisting is a better approach to defend against rising targeted attacks
  • How application whitelisting has evolved to provide a new level of intelligence that delivers more effective security and necessary flexibility to improve productivity - in even rapidly changing endpoint environments

Featured Speakers

Paul Henry, Security and forensics expert, Lumension

Chris Merritt, Director of solution marketing, Lumension

Click here to register for FREE!

Sponsored by:

Share this article:
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

Life after a data breach: Identifying and containing advanced threats at the ...

Compromise can happen in seconds and containment can take weeks. For enterprises, it's no longer a matter of if you will be breached, but rather a matter of when.

Big Data - Your secret weapon in the war against cyber crime

Right now, Web attackers are amassing a global arsenal of knowledge and resources that is allowing them to expanding their reach well beyond financial services to virtually every industry, everywhere.

The one-man SOC: Habits of highly effective security practitioners

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key.