PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Do thoughts of your least secure endpoint keep you up at night?
This article is part of the Information Security issue of July 2017
A company's security defenses are as strong as its least secure endpoint. A sobering thought, especially when considering how many endpoints -- laptops, desktops, tablets, mobile phones and such -- will access sensitive company data via the enterprise network in a single day. Add to that equation the number of bad actors attempting to use these endpoints to breach security, and it's a wonder infosec pros can sleep at night. But there's new tech becoming available to secure those endpoints. While hackers have been busy devising new attacks, like mutating ransomware and malware that can shut down when it senses a sandbox, the brains of security vendors have been hard at work -- and, in some recent cases, collaborating. Behavior analytics systems can now deliver a granular window into user actions to better identify bots and other bad actors. Sandbox services in the cloud can quickly distribute newly found threat info to customers quickly; tech has also advanced to the point where it can fool malware into thinking it's not being ...
Features in this issue
-
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints.
-
Mobile security trends: app containers, app wrapping for BYOD
Threats evolve, and so should mobile security strategies. Mike Chapple explains how an app containers and app wrapping can protect enterprise devices and corporate assets.
Columns in this issue
-
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies.