Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/13/2017
04:00 PM
Jai Vijayan
Jai Vijayan
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Emerging IT Security Technologies: 13 Categories, 26 Vendors

A rundown of some of the hottest security product areas, and vendors helping to shape them.
4 of 14

Next-Generation Endpoint Security

Products and services for proactively identifying attacks and preventing breaches on endpoint devices. 


Vendor: Crowdstrike

Cloud-delivered, cloud-native security that combines next generation endpoint protection with endpoint detection response and threat hunting.
	
Factors to Watch

- Unified endpoint protection, detection and response
- Widespread attention for identifying hackers behind DNC breach
- Solidly financed with $256 million raised so far; Over $1 billion market valuation



Key Executives: President, CEO and co-founder George Kurtz is the author of the widely popular security book Hacking Exposed: Network Security Secrets & Solutions.  Prior to Crowdstrike, Kurtz was CTO at McAfee and prior to that he founded Foundstone. Dmitri Alperovitch, CTO and co-founder, leading the Intelligence, Technology and CrowdStrike Labs teams. 

Founded: 2011


Vendor: Cylance

AI-powered security for blocking known and unknown malware at the endpoint.
	
Factors to Watch

- Mature AI and machine learning-based threat prevention
- Consumer segment play with AI-powered antivirus tool
- Rumored IPO; Cybersecurity unicorn with $1 billion valuation



Key Executives: CEO and co-founder Stuart McClure along with CTO and co-founder Ryan Permeh are regarded as pioneers in the next generation AV space. Both were formerly with Intel's McAfee.

Founded: 2012

Analyst Commentary: 'EDR is an analytics product that sits on the endpoint,' says Jon Oltsik an analyst at Enterprise Strategy Group. 'The people who buy those [products] are SOC people, not endpoint security people,' he says. 'There's goodness in having a single agent comparing endpoint behavior...[with] things like signatures and heuristics, for example. There's some rationale that those will come together, but who knows. Everyone [security vendors] is chasing that.'

IDCs Lindstrom says he doesn't see too much of a difference between EDR and products that are being touted as next-generation AV tools. 'In any case these folks are crucial as we work towards a 'patch independent strategy. Among the vendors in this space, the one that appears to getting particularly positive feedback in this space is Cylance, Lindstrom adds.

'I would also say the 'Next Gen' moniker is kinda 'Past Gen,' adds Frank Dickson, an IDC analyst.  'Integrated solutions are increasing popular, especially as it relates to reducing the number of agents on the endpoint.  Agent fatigue is growing.'

Image Source: AlexLMX via Shutterstock

Next-Generation Endpoint Security

Products and services for proactively identifying attacks and preventing breaches on endpoint devices.

Vendor: Crowdstrike

Cloud-delivered, cloud-native security that combines next generation endpoint protection with endpoint detection response and threat hunting.

Factors to Watch

  • Unified endpoint protection, detection and response
  • Widespread attention for identifying hackers behind DNC breach
  • Solidly financed with $256 million raised so far; Over $1 billion market valuation

Key Executives: President, CEO and co-founder George Kurtz is the author of the widely popular security book Hacking Exposed: Network Security Secrets & Solutions. Prior to Crowdstrike, Kurtz was CTO at McAfee and prior to that he founded Foundstone. Dmitri Alperovitch, CTO and co-founder, leading the Intelligence, Technology and CrowdStrike Labs teams.

Founded: 2011

Vendor: Cylance

AI-powered security for blocking known and unknown malware at the endpoint.

Factors to Watch

  • Mature AI and machine learning-based threat prevention
  • Consumer segment play with AI-powered antivirus tool
  • Rumored IPO; Cybersecurity unicorn with $1 billion valuation

Key Executives: CEO and co-founder Stuart McClure along with CTO and co-founder Ryan Permeh are regarded as pioneers in the next generation AV space. Both were formerly with Intel's McAfee.

Founded: 2012

Analyst Commentary: "EDR is an analytics product that sits on the endpoint," says Jon Oltsik an analyst at Enterprise Strategy Group. "The people who buy those [products] are SOC people, not endpoint security people," he says. Theres goodness in having a single agent comparing endpoint behavior[with] things like signatures and heuristics, for example. Theres some rationale that those will come together, but who knows. Everyone [security vendors] is chasing that.

IDCs Lindstrom says he doesn't see too much of a difference between EDR and products that are being touted as next-generation AV tools. "In any case these folks are crucial as we work towards a 'patch independent strategy. Among the vendors in this space, the one that appears to getting particularly positive feedback in this space is Cylance, Lindstrom adds.

"I would also say the Next Gen moniker is kinda Past Gen," adds Frank Dickson, an IDC analyst. "Integrated solutions are increasing popular, especially as it relates to reducing the number of agents on the endpoint. Agent fatigue is growing."

Image Source: AlexLMX via Shutterstock

4 of 14
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
MarkS94105
100%
0%
MarkS94105,
User Rank: Apprentice
12/8/2017 | 2:28:08 PM
Story -> Potentially Valuable; Site -> Problematic Viewing and Printing
This topic and story is presented as a white paper.  To read the story, we must click the next arrow 13 times to see all 14 pages.  This is time consuming as the site loads so many advertisements.  There is no simple way to print the story, as the print function show only 1 of 14, 2 of 14, etc.  This may be by design, but I find it a serious barrier and will seek other sources for this material.  
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.