> White Papers > Lumension > 3 Strategies to Protect Endpoints from Risky Applications
 

3 Strategies to Protect Endpoints from Risky Applications

Lumension

If there’s one truth that security researchers have uncovered today about the criminal hacking community, it’s that the bad guys are engaged in a love affair with the application layer. Microsoft has made strides in hardening its operating system from attacks and improving its patch release process and more organizations than ever are patching their operating systems in a timely fashion. But in an application-rich business environment, cyber criminals are having a field day attacking un-patched client-side applications.

Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Mar 28, 2011
Length:  9
Type:  White Paper