Organizations must defend themselves at all levels of their business, not just at email and web gateways. Servers, desktops, laptops and mobile devices must be comprehensively secured to defend against a myriad of threats. Cyber-criminals can exploit network vulnerabilities which allow them to deposit malware into a user computer in seconds. This new breed of malware (malicious software) is increasingly surreptitious, keeping a low profile and mutating rapidly; stealing in and providing back door access to sensitive data.