Protect Your Endpoint Memory: Stop Fileless Attacks

Protect Your Endpoint Memory: Stop Fileless Attacks


Available On Demand
Duration 1h 0min
Braden Preston
Principal Product Manager
Braden Preston
Braden is a customer-focused Product Manager with 9 years of experience in developing customer requirements and leading product development. He possesses an excellent ability to listen to customer challenges, derive customer and market requirements and lead cross-functional design teams to bring products to market. Braden previously led development teams on the Harris Atari Program that won the New Startup Award for Harris Proprietary Businesses in 2008.
In 2012, Braden was the Deputy commissioner and Technology workgroup co-lead on the TechAmerica Cloud Commission for State and Local Government and was also the Deputy commissioner on the 2011 TechAmerica Cloud Commission for Federal Government.
Peter Krass
Contributing Editor
Peter Krass
Peter Krass is a writer, editor, and editorial consultant with more than 20 years of experience as a professional journalist. His fields of expertise include information technology and small business, and he has worked in a wide variety of media, including magazines, newsletters (both print and e-mail), newspapers, books, film, and Web sites. Peter has worked extensively in Web-site publishing.

Peter has held a number of senior editorial positions, including: Senior Editor at Inc., the monthly magazine for small-business owners; Chief Editor of; Senior Managing Editor of Features at InformationWeek, a weekly magazine for business and technology managers; and Managing Editor of the BusinessWeek Newsletter for Information Executives. Peter's awards include a Computer Press Award for best news story of the year. He is also the author of Sojourner Truth, a children’s book on the life of the American abolitionist.

Advanced attackers use sophisticated techniques to compromise, entrench and act on critical assets. With the rise of fileless attacks, Security Operations Center (SOC) teams must protect endpoint memory to stop adversaries from gaining foothold on enterprise endpoints.
Attend this webinar and you will:

  • Understand the anatomy of fileless attack
  • Get in-depth information on the proliferation of fileless attacks and attack types
  • Find out how in-memory protection stops fileless attacks

Already a member? Login