Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/31/2015
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Elements Of Modern Endpoint Security

What it takes to secure and tap into the 'source of the truth' in today's threatscape.
Previous
1 of 8
Next

Most businesses are still wrestling with beefing up their existing endpoint security tools--typically a mix of antivirus, host intrusion prevention system (HIPS), host firewall, whitelisting, and heuristics, for example--to better defend against attacks that are morphing so fast that it's impossible to catch everything and targeted malware or attacks that bypass security measures. Bottom line: the human behind the endpoint keyboard is impossible to shield from harm when all it takes is a click to be attacked.

But change is coming. Longtime endpoint security giants Symantec and McAfee, now Intel Security, this week each rolled out integrated security architectures that begin the process of evolving endpoint security beyond the old-school, signature-based prevention approach, to one that is more about quickly detecting and fixing endpoints when inevitable attack attempts occur. And next-generation startups are pushing the endpoint detection & response (EDR) approach, where the endpoint is not merely the problem with security, but a key piece of the solution. 

[A slew of startups and veteran security firms are moving toward proactive and adaptive detection and mitigation for securing the endpoint. But few enterprises are ready to pull the antivirus plug. Read The Rebirth Of Endpoint Security.]

There are several key features in modern, or next-generation, endpoint security, and different vendors have different approaches. But the underlying philosophy of the new wave of offerings is the reality that endpoints will be targeted as the initial attack vector, so rapid detection and incident response at the device is crucial.

Here are some of the main elements in modern (or reborn) endpoint security.  

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MikkoK496
0%
100%
MikkoK496,
User Rank: Apprentice
11/18/2015 | 8:33:27 AM
#8
Encryption & Wiping?
Gebildete
0%
100%
Gebildete,
User Rank: Apprentice
11/9/2015 | 4:58:17 AM
Testing.
It's only time of the question how can we secure our data. I always test all the apps on the konstruktor. The ASAP bugs are connected with the security. What can we do to protest ourselves? We can work not fast but efficiently.  
wkupersa
100%
0%
wkupersa,
User Rank: Apprentice
11/2/2015 | 10:22:01 PM
Post-exploit
n important differentiator of these tools versus traditional tools like AV is that these tools can see post-exploit behavior and that is where we are traditionally blind. Our traditional tools focus on the exploit. A motivated adversary will eventually find a way in. We haven't had tools that collect the data required to differentiate a malicious attacker from a benign administrator. These types of tools have the potential to give us useful insight into the intention of actions taken on our end point devices.
kshaurette
100%
0%
kshaurette,
User Rank: Strategist
11/2/2015 | 9:31:25 AM
User Activity and Behavior Monitoring
Has anyone looked into the smaller company out of Wisconsin called Sergeant Laboratories, www.sgtlabs.com.  They've recently been making a claim to be able to provide a level of behavior monitoronig that other solutions don't do.  I"ve worked with their product in the past in a former life implementing it in schools, governmennt and a couple banks.  Back then it was really strong for forensics and tracking activity, but I hear from a recent confernece the've really changed the arcitecture to offer a much more robust tracking and was wondering if any others had seen or experience this to refute or confirm the claims.
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22879
PUBLISHED: 2021-04-14
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
CVE-2021-27989
PUBLISHED: 2021-04-14
Appspace 6.2.4 is vulnerable to stored cross-site scripting (XSS) in multiple parameters within /medianet/sgcontentset.aspx.
CVE-2021-25316
PUBLISHED: 2021-04-14
A Insecure Temporary File vulnerability in s390-tools of SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-SP2 allows local attackers to prevent VM live migrations This issue affects: SUSE Linux Enterprise Server 12-SP5 s390-tools versions prior to 2.1.0-18.29.1. SUSE Linux Enterp...
CVE-2021-28797
PUBLISHED: 2021-04-14
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (an...
CVE-2020-36323
PUBLISHED: 2021-04-14
In the standard library in Rust before 1.50.3, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.