The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security
The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

Click here to register for FREE!


Date:
Tuesday April 5th 2011
Time: 2:00 p.m. ET/11:00 a.m. PT

Today, more than 1.6 million new malware signatures are identified each month. And more organizations are falling prey to “zero-day” attacks – malware for which an anti-virus signature does not exist. It's no surprise that roughly half of the organizations surveyed in a 2010 Ponemon Institute study reported an increase in their IT operating expenses - a main driver of that cost increase was malware. Traditional anti-virus simply can't keep up in the malware arms race and relying on it as your primary defense will prove costly.

In this webcast, Paul Henry, security and forensics expert, and Chris Merritt, Director of Solution Marketing with Lumension, will examine:

  • The true cost of anti-virus in terms of PC performance, network bandwidth, IT helpdesk costs, prevention of malware and more
  • Why application whitelisting is a better approach to defend against rising targeted attacks
  • How application whitelisting has evolved to provide a new level of intelligence that delivers more effective security and necessary flexibility to improve productivity - in even rapidly changing endpoint environments

Featured Speakers

Paul Henry, Security and forensics expert, Lumension

Chris Merritt, Director of solution marketing, Lumension

Click here to register for FREE!

Sponsored by:

close

Next Article in Vendor Webcasts

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...