Governance & Risk Management

The Threat Landscape for Small and Midsize Enterprises

Dell's Brett Hansen on Moving Beyond Legacy Strategies
Brett Hansen, vice president and general manager, client software and security solutions, Dell

In addition to an overreliance on anti-virus and anti-malware tools, small and midsize enterprises lack the resources or expertise to catch new and sophisticated forms of attacks, says Brett Hansen of Dell, who offers strategic insights.

See Also: How Enterprise Browsers Enhance Security and Efficiency

"The good news is AVM technology has improved and we're seeing much higher efficacy at stopping malware-based threats," he says. "The challenge is the the adversaries are also evolving, and so as much as two-thirds of attacks today are non-malware based."

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Hansen discusses:

  • How the security strategies of small and midsize enterprises need to evolve;
  • Moving beyond and AV/AM-driven security strategy;
  • Using automation and best-of-breed technologies to secure the endpoint.

Hansen is vice president and general manager, client software and security solutions, at Dell. He has more than 15 years of experience leading business development and channel functions in the software industry.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.