One Step Ahead of Advanced Attacks and Malware

  • Wednesday, February 26, 2014 | 9:20 AM – 10:20 AM | North | Room: 132

View all Sessions

Signature-based approaches offer excellent precision and efficiency, but lack the depth needed to protect against advanced malware and stealthy attacks. On the other hand, alternatives are out-of-band, time consuming and disjointed, making them interesting on paper but not as effective in practice. Come and learn about innovative techniques that marry both sides in a practical manner today.


This document was retrieved from on Thu, 21 Sep 2017 22:42:28 -0400.
© 2017 EMC Corporation. All rights reserved.