One Step Ahead of Advanced Attacks and Malware

  • Wednesday, February 26, 2014 | 9:20 AM – 10:20 AM | North | Room: 132

View all Sessions

Signature-based approaches offer excellent precision and efficiency, but lack the depth needed to protect against advanced malware and stealthy attacks. On the other hand, alternatives are out-of-band, time consuming and disjointed, making them interesting on paper but not as effective in practice. Come and learn about innovative techniques that marry both sides in a practical manner today.


This document was retrieved from on Sat, 28 May 2016 18:06:53 -0400.
© 2016 EMC Corporation. All rights reserved.