• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Responding to Malware Threats: 3 All-Too-Common Missteps

With all of the bad news about malware out there, how about a “glass half full perspective?” According to one study, malware infections aren’t necessarily becoming more common. The key wordFrustrated business man on laptop there is necessarily, as IT leaders are on the fence about the issue. Still, it could be worse. For a look at how it could be worse, here’s their two cents on whether malware infections are getting more severe: yes. Absolutely yes.

This information comes from a study by the Ponemon Institute called “The Cost of Malware Containment.” In the study, IT leaders covering a wide breadth of responsibilities were asked to share their thoughts on malware as a whole and their defense strategies. One of the more eye-catching questions concerned the volume and severity of malware infections. Here’s how their answers broke down:

  • There is a dead heat between those who felt malware infection rates were increasing (45%) and those who felt malware rates were staying the same (45%).
  • The consensus is that malware infections that do occur are becoming more severe (60%), compared to holding steady (31%).

These weren’t the only items worth noting turned up by the researchers. The study also uncovered some interesting – and troubling – tidbits about the security strategies employed by businesses. It found:

  • 33% of IT leaders said their business takes an ad hoc, unstructured approach to malware containment
  • 40% of those surveyed said no one person or function is tasked with taking the lead on malware containment
  • Only 41% of businesses have introduced some level of automation into their malware containment process

Regardless of whether you believe malware rates are on the rise or are in a holding pattern, we can all agree the above three bullets aren’t ideal ways to secure the corporate network. Especially not when the increasing severity of malware infections taking place is factored into the equation.

Minimizing the threat of malware infections

A better tactic? A solution which provides the automation – and just as important – the structure businesses need in response to the threat posed by malware. That automation ensures hazards are addressed quickly, without requiring closer attention from IT (pulling them off of other projects). Meanwhile, structure eliminates the likelihood that something might go unnoticed because someone thought someone else had it covered.

Cisco’s Rapid Threat Containment Solution can help businesses realize those benefits and more. This solution brings together the malware detection and remediation capabilities of Cisco’s FireSIGHT Management Center (FMC) and its network enforcer Identity Services Engine (ISE). These tools work together to identify malware infections, and adjust access policies accordingly to limit the damage an intruder can do before it is given the boot.

That’s a high-level look at the role Rapid Threat Containment plays in the fight against malware. For a more comprehensive take, join us on June 9 at the Sheraton Valley Forge in King of Prussia, PA for the 2nd Annual Arraya Solutions Tech Summit. This free, all-day event features courses covering today’s hottest tech issues and tools – put together by our team of solutions engineers and architects, guaranteeing a day that is strictly by techs, for techs.

The day’s course catalog features sessions on data protection, cloud, communication, and more – including Rapid Threat Containment. Attendees will learn exactly how FMC and ISE work together to repel threats quickly and effectively. They’ll also gain valuable insights into how to manage a Rapid Threat Containment deployment.

To learn more about our Tech Summit, or to register, please visit: arraya.info/TechSummit. Also, follow us on social media (Twitter, LinkedIn, and Facebook) to keep up with all of the latest Tech Summit news, company updates, and other special Arraya events.

 

 

 

 

 

 

 

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}