Whitepaper: Trend Micro's 10 step APT action plan

By design, advanced persistent threats (APTs) are able to evade standard perimeter and endpoint defences. Standard security defences are critical to the overall security architecture but cannot detect or prevent targeted attacks or APTs. Discovery and containment can take weeks to months and there is great risk of data loss.

Industry analysts and experts have made a clear case that an expanded definition of security due diligence is now “a must” for enterprises and government organisations. New, proactive measures and specialised technology are required as part your risk management due diligence.

This paper will outline ten steps essential for creating an effective action plan to defend against targeted attacks and APTs. These steps will help you to consider your current situational awareness, level of preparation and operative ability toward off a persistent attacker. These steps include actions to implement the specialised detection and intelligence activities that are key to defending against targeted attacks and APTs.

This content has been created and paid for by Trend Micro

Log In

Username / Email:
Password:
  |  Forgot your password?