Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/31/2015
09:00 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

7 Elements Of Modern Endpoint Security

What it takes to secure and tap into the 'source of the truth' in today's threatscape.
Previous
1 of 8
Next

Most businesses are still wrestling with beefing up their existing endpoint security tools--typically a mix of antivirus, host intrusion prevention system (HIPS), host firewall, whitelisting, and heuristics, for example--to better defend against attacks that are morphing so fast that it's impossible to catch everything and targeted malware or attacks that bypass security measures. Bottom line: the human behind the endpoint keyboard is impossible to shield from harm when all it takes is a click to be attacked.

But change is coming. Longtime endpoint security giants Symantec and McAfee, now Intel Security, this week each rolled out integrated security architectures that begin the process of evolving endpoint security beyond the old-school, signature-based prevention approach, to one that is more about quickly detecting and fixing endpoints when inevitable attack attempts occur. And next-generation startups are pushing the endpoint detection & response (EDR) approach, where the endpoint is not merely the problem with security, but a key piece of the solution. 

[A slew of startups and veteran security firms are moving toward proactive and adaptive detection and mitigation for securing the endpoint. But few enterprises are ready to pull the antivirus plug. Read The Rebirth Of Endpoint Security.]

There are several key features in modern, or next-generation, endpoint security, and different vendors have different approaches. But the underlying philosophy of the new wave of offerings is the reality that endpoints will be targeted as the initial attack vector, so rapid detection and incident response at the device is crucial.

Here are some of the main elements in modern (or reborn) endpoint security.  

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MikkoK496
0%
100%
MikkoK496,
User Rank: Apprentice
11/18/2015 | 8:33:27 AM
#8
Encryption & Wiping?
Gebildete
0%
100%
Gebildete,
User Rank: Apprentice
11/9/2015 | 4:58:17 AM
Testing.
It's only time of the question how can we secure our data. I always test all the apps on the konstruktor. The ASAP bugs are connected with the security. What can we do to protest ourselves? We can work not fast but efficiently.  
wkupersa
100%
0%
wkupersa,
User Rank: Apprentice
11/2/2015 | 10:22:01 PM
Post-exploit
n important differentiator of these tools versus traditional tools like AV is that these tools can see post-exploit behavior and that is where we are traditionally blind. Our traditional tools focus on the exploit. A motivated adversary will eventually find a way in. We haven't had tools that collect the data required to differentiate a malicious attacker from a benign administrator. These types of tools have the potential to give us useful insight into the intention of actions taken on our end point devices.
kshaurette
100%
0%
kshaurette,
User Rank: Strategist
11/2/2015 | 9:31:25 AM
User Activity and Behavior Monitoring
Has anyone looked into the smaller company out of Wisconsin called Sergeant Laboratories, www.sgtlabs.com.  They've recently been making a claim to be able to provide a level of behavior monitoronig that other solutions don't do.  I"ve worked with their product in the past in a former life implementing it in schools, governmennt and a couple banks.  Back then it was really strong for forensics and tracking activity, but I hear from a recent confernece the've really changed the arcitecture to offer a much more robust tracking and was wondering if any others had seen or experience this to refute or confirm the claims.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13485
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
CVE-2020-13486
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection.
CVE-2020-13482
PUBLISHED: 2020-05-25
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVE-2020-13458
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13459
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.