One Step Ahead of Advanced Attacks and Malware

  • Wednesday, February 26, 2014 | 9:20 AM – 10:20 AM | North | Room: 132

View all Sessions

Signature-based approaches offer excellent precision and efficiency, but lack the depth needed to protect against advanced malware and stealthy attacks. On the other hand, alternatives are out-of-band, time consuming and disjointed, making them interesting on paper but not as effective in practice. Come and learn about innovative techniques that marry both sides in a practical manner today.


This document was retrieved from on Wed, 25 Nov 2015 03:12:42 -0500.
© 2015 EMC Corporation. All rights reserved.