The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

Share this article:
The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security
The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

The True Cost of AV: How to Ensure More Effective and Efficient Endpoint Security

Click here to register for FREE!


Date:
Tuesday April 5th 2011
Time: 2:00 p.m. ET/11:00 a.m. PT

Today, more than 1.6 million new malware signatures are identified each month. And more organizations are falling prey to “zero-day” attacks – malware for which an anti-virus signature does not exist. It's no surprise that roughly half of the organizations surveyed in a 2010 Ponemon Institute study reported an increase in their IT operating expenses - a main driver of that cost increase was malware. Traditional anti-virus simply can't keep up in the malware arms race and relying on it as your primary defense will prove costly.

In this webcast, Paul Henry, security and forensics expert, and Chris Merritt, Director of Solution Marketing with Lumension, will examine:

  • The true cost of anti-virus in terms of PC performance, network bandwidth, IT helpdesk costs, prevention of malware and more
  • Why application whitelisting is a better approach to defend against rising targeted attacks
  • How application whitelisting has evolved to provide a new level of intelligence that delivers more effective security and necessary flexibility to improve productivity - in even rapidly changing endpoint environments

Featured Speakers

Paul Henry, Security and forensics expert, Lumension

Chris Merritt, Director of solution marketing, Lumension

Click here to register for FREE!

Sponsored by:

Share this article:
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

The NIST Framework: The Public's Stake in the Cybersecurity of our Critical ...

The announcement in February 2014 by the White House of a Framework for the development of cybersecurity standards follows the announcement one year earlier by the White House of a Presidential Executive Order describing the Government's overall policy toward the cybersecurity on our nation's critical ...

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Addressing Identity and Access Management with a Unified Open source Identity and ...

Many IT organizations today are tasked to manage a complex landscape that includes a mix of SaaS applications and on-premise applications being accessed by various user populations; employees, customers, mobile workers, etc.