Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

8 Important Features You Need In An Endpoint Security Tool

From having the ability to remove agents and detect malicious scripting to probing the behavior of machines rather than signature models, here are eight things companies need in an endpoint security tool.

Back 1 ... 6   7   8   9   Next
photo

Examine Behavior, Not Signature Models

Endpoint detection and response models are going to be very helpful in a world where attackers are already on the machine and not exploiting vulnerabilities, said Ryan Kalember, Proofpoint’s executive vice president of cybersecurity strategy. A rise in malware attacks that look like code and ask users to run it have been a huge boon for defenses that look at behavior rather than signature-based models.

Endpoint detection and response is about detecting things that are acting funny rather than finding malicious files from static PEs or binaries, Kalember said. That has become more relevant since the point of initial compromise today is typically a user that’s been tricked into running malicious code on behalf of an attacker, according to Kalember.

Human adversaries are today involved more often than not in the attacks that matter, meaning that a detection- and response-oriented response will get companies further than focusing primarily on prevention, according to Kalember. And as organizations adopt multifactor authentication more broadly, Kalember expects that malware will be a popular way to get around it.

 
 
Back 1 ... 6   7   8   9   Next

sponsored resources