Page 18 - index
P. 18







policies on what should be automatically removed, what should be detected by a machine
and later flagged for human decision, and lastly what can remain on the network. Enabling
that range of policy-driven responses to suspected malware is incredibly important for
staying within the varying comfort level of security professionals; some may want to
automate the process of killing identified APTs while others would prefer to automatically
quarantine suspicious code. Allowing security professionals to automate what they want and
no more is a key capability for automated malware removal software.

Interested in learning more? Download Clark’s whitepaper, “The Case for Automated Malware
Removal” for an in-depth overview on why automated malware removal is the key technology
for fighting Advanced Persistent Threats.



About the Author


Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions in
March 2014. His responsibilities include analyst relations, competitive and
market intelligence, corporate visibility, M&A, and strategic partnership
development. Todd draws on his 17+ years of experience as an equity
research analyst where he covered the security industry for much of that
time. In his equity research career Todd provided research coverage of over
60 companies across several technology sectors, including security,
infrastructure software, data center/cloud hosting, and healthcare IT.


Connect with Hexis online: http://www.hexiscyber.com/

Hexis Blog: http://www.hexiscyber.com/blog

Twitter: @hexis_cyber

LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions



















18 Cyber Warnings E-Magazine – November 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   13   14   15   16   17   18   19   20   21   22   23