PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
July 2017

Do thoughts of your least secure endpoint keep you up at night?

A company's security defenses are as strong as its least secure endpoint. A sobering thought, especially when considering how many endpoints -- laptops, desktops, tablets, mobile phones and such -- will access sensitive company data via the enterprise network in a single day. Add to that equation the number of bad actors attempting to use these endpoints to breach security, and it's a wonder infosec pros can sleep at night. But there's new tech becoming available to secure those endpoints. While hackers have been busy devising new attacks, like mutating ransomware and malware that can shut down when it senses a sandbox, the brains of security vendors have been hard at work -- and, in some recent cases, collaborating. Behavior analytics systems can now deliver a granular window into user actions to better identify bots and other bad actors. Sandbox services in the cloud can quickly distribute newly found threat info to customers quickly; tech has also advanced to the point where it can fool malware into thinking it's not being ...

Features in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close