Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1   2   3   ... 11 Next

photo
9. Microsoft Enhanced Mitigation Experience Toolkit

Microsoft's Enhanced Mitigation Experience Toolkit is entering its fourth iteration, but it has seen sluggish adoption. If the tool is enabled, it makes it more difficult for an attacker to target memory corruption vulnerabilities, a common attack technique. The tool also helps administrators closely validate digital certificates to safeguard against man-in-the-middle attacks. EMET helps support the roll out of Microsoft's security mitigation technologies.

Microsoft said the toolkit drastically reduced the effectiveness of application exploits on Windows systems. In tests conducted by Microsoft, EMET running on Windows XP SP3 systems reduced the effectiveness of the exploits by 88 percent. The same test conducted on a Windows 7 system reduced the effectiveness of the exploits by 94 percent, Microsoft said.

 
 
Back 1   2   3   ... 11 Next

sponsored resources