aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days


Guide to defense in depth: The hidden flaws in Windows

Page 01 Download the eBook


In just a few years, the security threats out in the wild have changed dramatically and the amount of them has grown exponentially. We've seen the major anti-malware companies and their executives publicly declare the usage of reactive measures to be insufficient to protect PC's in the future. Why? The reasoning behind this is quite simple actually.

As reactive security measures aims to identify the 200,000 new samples gathered every single day in 2014*, the ever increasing volume makes this a seemingly impossible task. On the other hand, proactive security only needs to identify a few hundred applications trusted by a company.

In this chapter, ethical hacker and Microsoft MVP Sami Laiho will focus on the Windows platform and explore the hidden flaws in Windows that make proactive security solutions the only way forward for 2015 and beyond.