SOURCE: Zellerent Inc.

March 22, 2007 11:00 ET

Endpoint Attacks Loom as Top IT Security Threat to Enterprises

"Computer Viruses Have Grown Up" White Paper Details Actions CIOs Must Take to Protect Their IT Assets

FREMONT, CA -- (MARKET WIRE) -- March 22, 2007 -- According to a new white paper by Zellerent (, a Fremont, Calif. company that specializes in Business-Driven Compliance and Business-Driven Security for Fortune 1000 and emerging growth firms, "Many corporate executives still think they're dealing with teenagers instead of with syndicates run by global Godfathers."

According to Roby Jacob, CEO of Zellerent, the result is "CIOs are prepared for yesterday's threats, when viruses and malware primarily attacked infrastructure. But today they are in serious danger from far more sophisticated threats and targeted strikes that attack endpoints. By endpoints, we mean browsers, workstations, email clients, PDAs, and the hardware and software that end users interact with."

The Zellerent White Paper "Viruses Have Grown Up: Why CIOs Must Start Defending Against Endpoint Attacks" is available immediately for free download at: The IT security subjects covered include:

-- The true nature of the malware threat today

-- Spurious threats that can lead you astray

-- Why CIOs need to focus attention on Endpoint Attacks

-- 10 Myths and Truths about viruses, Trojan Horses, worms and malware that you must know

-- Why installing anti-virus applications won't solve the problem

-- Why security matters when it comes to Sarbanes-Oxley, HIPAA, 21CFR11 and other IT compliance mandates and standards

-- How to protect against threats to the enterprise infrastructure and the endpoints

-- How to design and deploy commonsense IT security defenses: An 8-Point Plan

-- How not to become a victim of Viral Myopia

About Zellerent

Zellerent offers Business-Driven consulting expertise in the areas of IT Compliance, IT Security and IT Risk Management. Its compliance and security practices cover Regulatory Compliance (SOX, HIPAA, 21CFR11), Standards Compliance (ISO 27001, PCI DSS/VISA CISP), Security Deployments and Security Monitoring. Zellerent is strictly vendor agnostic, identifying and deploying scalable best-of-breed solutions regardless of their source (public domain, 3rd party vendors, custom implementations).

Zellerent's Business-Driven Compliance™ Practice identifies the gaps between a client's current IT compliance status and its compliance and business imperatives, and then performs remediation to close that gap. Documentation, monitoring and audit readiness services are also offered. Zellerent's Business-Driven Security™ Practice audits and assesses the internal and external security threats to a client's organization, creates an optimal security architecture for the enterprise, selects the appropriate applications, and deploys the proper controls. Awareness training and monitoring services are also provided.

Zellerent, Business-Driven Compliance and Business-Driven Security are trademarks of Zellerent Inc. All other trademarks are the properties of their respective owners.

Contact Information

  • Zellerent Contact:
    Steven Mason
    Email: Email Contact
    Tel: 650.776.7968