Homepage This page's url is: -crn- Rankings and Research Companies CRNtv Events WOTC Jobs Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 3   4   5   6   7   ... 11 Next

7. Real-Time Endpoint Or Server Monitoring

One of the big surprises that came out of the Bit9 survey was that 13 percent of those surveyed did not know whether they had any security incidents, Bit9 Chief Security Officer Nick Levay said.

Businesses are considering strong technologies that can provide real-time endpoint or server monitoring to keep track of security incidents, according to the survey. Tracking metrics, such as how many times a help desk team needs to investigate a potential problem or how many times a laptop needs to be reimaged, can help prove the return on investment of security, Levay said.

"It's very easy to miss a trend within an organization that should be hitting you in the face because you are simply not gathering metrics," Levay said.

Back 1 ... 3   4   5   6   7   ... 11 Next

sponsored resources