Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom Lenovo Newsroom Nutanix Newsroom Cisco Live Newsroom HPE Zone Tech Provider Zone

10 Endpoint Security Technologies And Tips Proven To Deny Hackers

Even though security experts say there is no silver bullet when it comes to IT security, vulnerability and configuration management, emerging file behavior technologies and security awareness training combine to help reduce the risk of being breached by custom malware and zero-day attacks.

Back 1 ... 8   9   10   11   Next

photo
3. File Detonation Technologies

Businesses are also considering the deployment of file inspection technologies as part of enhanced detection, according to the Bit9 survey. Emerging capabilities from Palo Alto Networks and FireEye inspect documents and executable files in a virtual or sandbox environment. Levay said the file is run in the safe environment to scrutinize its behavior and determine if it is malicious. The systems determine if it drops registry keys or other suspicious files, he said.

"These are next-generation solutions where you are looking for threats that don't have a signature," Levay said. "Traditional antivirus is relatively useless unless the attack matches some sort of signature. Attacks that are brand new, used for the first time or customized for their target, are not going to be detected by antivirus."

 
 
Back 1 ... 8   9   10   11   Next

sponsored resources