10 Endpoint Security Technologies And Tips Proven To Deny Hackers

1. File And System Behavior Technologies

Technologies that improve detection of malware and suspicious activity at the endpoint are gaining interest, according to Bit9's survey, which identified business IT security priorities for 2014. Levay told CRN that organizations are seeking technologies that can scan endpoints for indicators of compromise, such as the behavior of new files on a system or new software installed by the user. In-place enhanced detection looks at files running on the endpoint. Up until now, activity occurring on the endpoint has been very noisy, Levay said.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.