Apt Whitepapers


Sort by: Date | Company | Title


Gartner Magic Quadrant for Mobile Data Protection (MDP)
By Check Point Software Technologies | 14/12/2014
Gartner has positioned Check Point as a Leader in the Mobile Data Protection (MDP) Magic Quadrant for the eighth consecutive year.1 Gartner evaluates each company’s MDP offerings on a scale of completeness of vision and ability execute. Read the full report to see which vendors made it to the Magic Quadrant, compare their strengths and cautions, and see what Gartner says about Check Point.
Download this now


Miercom Advanced Threat Prevention with Sandbox Analysis Testing Report
By Check Point Software Technologies | 14/12/2014
Protecting against known, and new, advanced, unknown threats requires the most rapid and precise detection and protection technologies. With multiple solutions available, finding the best one can be challenging. Independent testing firm Miercom took on this challenge and tested network-based advanced threat prevention solutions that use virtual sand boxing. They found the solution delivering the fastest, most accurate and efficient solution against known and unknown threats.
Download this now


A blueprint for detection & response
By LogRhythm | 4/12/2014
Recent highly publicized breaches involving sophisticated attacks and high-profile targets has elevated awareness of Advanced Persistent Threats (APTs) to unprecedented levels. This has left many organizations struggling to understand the risk APTs present to them and how best to protect themselves. For organizations concerned with APTs, and advanced threats in general, SIEM is a critical component of a defense-in-depth architecture.
Download this now


The 10-Step Security Action Plan
By Trend Micro Australia | 1/8/2013
In this whitepaper, we look at ten essential steps in creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability to ward off a persistent attacker. For more, click to download
Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro Australia | 30/11/2012
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download this now


Detecting APT Activity with Network Traffic Analysis
By Trend Micro Australia | 13/11/2012
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download this now
CIO
ARN
Techworld
CMO