TY - BOOK ID - 64870938 TI - 2016 11th International Conference on Malicious and Unwanted Software (MALWARE) PY - 2016 SN - 1509045422 1509045430 PB - Piscataway : IEEE, DB - UniCat KW - Malware (Computer software) KW - Computer networks KW - Computer software KW - Security measures KW - Computer code, Malicious KW - Malevolent software KW - Malicious computer code KW - Malicious software KW - Software, Malevolent KW - Software, Malicious UR - https://www.unicat.be/uniCat?func=search&query=sysid:64870938 AB - The Focus of the conference this year is twofold (1) Security architectures & reformulated solutions, and (2) The demise of traditional end point protection The topics are described in the paragraphs below In the past, the security protection model that most organizations applied to protect their infrastructure was simply the Everything but the Kitchen Sink model meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base, and on, and on In essence, this model simply amounted to the accumulation of security devices Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed Security products are no longer about single or even multiple independent security devices each providing close as we can get to perfect standalone protection MALCON will explore alternative architectures and solutions. ER -