CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH Feature

May 23, 2014

IBM Releases Trusteer Apex Endpoint Protection Software

The endpoint protection market has been using antivirus products to protect endpoints. But these anti-virus approaches and firewalls have not been successful to stop attacks across the entire attack chain.

In fact, the threat has been shifted from viruses to highly sophisticated attacks that the market calls advanced persistent threats (APTs). These attacks are the work of cyber criminals who are absorbed in getting the value from stolen corporate assets such as intellectual property or customer data.

To tackle this serious issue, IBM (News - Alert) recently rolled out new security software, Trusteer Apex, that promises to halt threats at the weakest link, the endpoint, including laptops and desktops—the most susceptible to malware.

IBM's Trusteer Apex software protects endpoints throughout the threat life cycle by applying an integrated, multilayered defense to prevent endpoint compromise.

It offers easy deployment and automated threat analysis capability as well as many-sided endpoint defense without adding additional loads to the limited staff or impacting the end users.

This latest solution also stops attacks that are embedded into Java applications and bolt them from causing destruction on the enterprise.  Trusteer Apex (News - Alert) prevents malicious Java applications by assessing application trust and activity risk and blocking untrusted apps from doing high-risk activities. Additionally, this advanced software can recognize a phishing email that is unintentionally opened and stop it from exploiting the endpoint.

"Through extensive research, IBM has identified specific stages of the attack chain where cyber criminals have relatively few options to execute their malicious content," said Yaron Dycian, Vice President of Marketing, Products & Services at Trusteer, an IBM company.  "Current point solutions in the market offer narrow protections against specific attack vectors and create significant workload on overstretched security teams, making it difficult to manage against cyber threats.”

IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents.




Edited by Maurice Nagle
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter