Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 8   9   10   11   Next

photo
2. Automated Patch And Configuration Management

Rapid7 found that 17 percent of respondents have not, or are not sure if they have, updated endpoint systems with the latest operation system patches. A variety of automated patch and configuration management tools are available to help system administrators test operating system patches and deploy them to end-user machines.

System configuration issues also open up the attack surface to cybercriminals, giving them easy access to pivot to more sophisticated systems. Data breach studies found that attackers consistently target poorly configured systems, including remote access technologies and systems using weak or default passwords. Configuration management tools can also help identify high-risk areas and system components that are turned on but rarely, if ever, used by employees, say security experts.

 
 
Back 1 ... 8   9   10   11   Next

sponsored resources