• Twitter
  • FaceBook
Home > White Papers > Lumension > 3 Strategies to Protect Endpoints from Risky Applications

3 Strategies to Protect Endpoints from Risky Applications


If there’s one truth that security researchers have uncovered today about the criminal hacking community, it’s that the bad guys are engaged in a love affair with the application layer. Microsoft has made strides in hardening its operating system from attacks and improving its patch release process and more organizations than ever are patching their operating systems in a timely fashion. But in an application-rich business environment, cyber criminals are having a field day attacking un-patched client-side applications.

Email this page
Published:  Mar 28, 2011
Length:  9
Type:  White Paper
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft, anti spam, anti spyware, anti virus, risk management

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter