Next Generation Endpoint Protection

Macro trends like cloud and mobility change the requirements for endpoint security. Data can be stored on premise, in public clouds, or at the endpoints and needs to be protected and available 24×7 regardless of where it resides. At the same time this data is a high-value target for today’s organized crime. The total global impact of cybercrime has risen to USD 3 trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.

So how can you keep your data and business protected without
losing the agility required to compete in your quickly evolving marketspace?

Historically the technical battle between cybercrime and protection has been very reactive. First a threat needs to present itself, then the industry can mitigate this threat by writing different types of signatures to detect and block it.

Machine learning is a new technology that is here to stay. It seems like we can find a big part of the solution in this evolution. Machine learning means identifying millions of different characteristics of a file, then run millions of good and bad files into a large advanced system for machine learning to understand the differences in these characteristics between good and bad files. This works well in all different types of environments and could complement or replace traditional signature-based antivirus in many cases.

Download Knowledge

ngep_t

Level up by downloading our White Paper. Here you find useful information and answers on how you can let your endpoint protection be a part of your strategy and solution.

Detection & Response

There is no such thing as 100% protection, so how should you respond when you detect breached endpoints and do you have the tools to respond to this breach. When an infected endpoint is found inside the company there are a lot of questions that you would like to be able to answer:

  • Is any other endpoint infected?
  • When was this endpoint infected?
  • How was it infected?
  • What type of information is at risk?
  • Has any data been stolen?
  • Who did it and why?

To help customers with incident response there is a specific set of tools referred to as ”Endpoint Detection & Response” tools. They provide very advanced functionality for helping to quickly understand the impact of the breach and will help respond against it.

Known vs Unknown Threats

unknown

Historically the technical battle between cybercrime and protection has been very reactive. First a threat needs to present itself, then the industry can mitigate this threat by writing different types of signatures to detect and block it.

Today we see a number of alternative technical approaches to better protect against unknown threats. Which one chooses to use depends on the balance between the need for security on one hand and the demands on availability and agility on the other hand.