Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

8 Important Features You Need In An Endpoint Security Tool

From having the ability to remove agents and detect malicious scripting to probing the behavior of machines rather than signature models, here are eight things companies need in an endpoint security tool.

Back 1 ... 6   7   8   9   Next
photo

Ability To Remove Unnecessary Admin Rights

Many security vulnerabilities can be mitigated by removing admin rights, since if an actor lacks the privileges to drop a file in the victim’s ecosystem, it can’t carry out a ransomware attack, said Morey Haber, chief technology officer and chief information security officer at BeyondTrust. Given that anti-virus is table stakes for an endpoint security tool, Haber thinks that controlling admin rights comes next.

Removing admin rights is recognized as part of privileged access management (PAM) since every form of remote access is some form of privileged access, according to Morey. MSPs are doing remote access either to manage their own customers or are reselling remote access as a managed service to their customers, Morey said.

Some 88 percent of critical Microsoft vulnerabilities can be mitigated by removing admin rights, Morey said. And Morey said there’s no reason to use an on-premises endpoint security tool that requires an agent since cloud-based endpoint protection can automatically send logs and apply patches without requiring a VPN connection in the event the administrator is working remotely.

 
 
Back 1 ... 6   7   8   9   Next

sponsored resources