... Virus security incidents have been the number 1 attack item for four of the past five years, placing second in the other year. Interestingly, in the 2008 CSI survey, 97% of the respondents reported ... network traffic up to the application layer for signs of embedded malware. The Trend Micro solution performs ongoing monitoring for any active malware activity that may be in the process of stealing ... strengthens an organization's security infrastructure by monitoring the network for active infections that have successfully infiltrated. Once the threat discovery occurs, in real time, the...