Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Dell EMC Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM PartnerWorld Newsroom HPE Zone Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 8   9   10   11  

photo
1. File And System Behavior Technologies

Technologies that improve detection of malware and suspicious activity at the endpoint are gaining interest, according to Bit9's survey, which identified business IT security priorities for 2014. Levay told CRN that organizations are seeking technologies that can scan endpoints for indicators of compromise, such as the behavior of new files on a system or new software installed by the user. In-place enhanced detection looks at files running on the endpoint. Up until now, activity occurring on the endpoint has been very noisy, Levay said.

 
 
Back 1 ... 8   9   10   11  

sponsored resources