Cloud security best practices for defending against APTs

Logo
Presented by

Tyler Moffitt | Senior Threat Research Analyst

About this talk

Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms. Attendees will leave this presentation with: • An overview of the common threats and methods used to perform attacks. • A summary of the impact such threats bring to both users and businesses. • A better understanding of the challenges and benefits of deploying a cloud-based security solution.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (187)
Subscribers (63977)
OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk. Discover cyber resilience at carbonite.com and webroot.com.