Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Data Fabric NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 8   9   10   11  

1. File And System Behavior Technologies

Technologies that improve detection of malware and suspicious activity at the endpoint are gaining interest, according to Bit9's survey, which identified business IT security priorities for 2014. Levay told CRN that organizations are seeking technologies that can scan endpoints for indicators of compromise, such as the behavior of new files on a system or new software installed by the user. In-place enhanced detection looks at files running on the endpoint. Up until now, activity occurring on the endpoint has been very noisy, Levay said.

Back 1 ... 8   9   10   11  

sponsored resources