Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 8   9   10   11   Next

photo
2. Automated Patch And Configuration Management

Rapid7 found that 17 percent of respondents have not, or are not sure if they have, updated endpoint systems with the latest operation system patches. A variety of automated patch and configuration management tools are available to help system administrators test operating system patches and deploy them to end-user machines.

System configuration issues also open up the attack surface to cybercriminals, giving them easy access to pivot to more sophisticated systems. Data breach studies found that attackers consistently target poorly configured systems, including remote access technologies and systems using weak or default passwords. Configuration management tools can also help identify high-risk areas and system components that are turned on but rarely, if ever, used by employees, say security experts.

 
 
Back 1 ... 8   9   10   11   Next

sponsored resources