Scott Harris: Better Security Through Early Detection and Response
With the rise in cloud-based applications and third-party integration, early detection and response has become more important. To achieve the greatest ROI possible from their endpoint-security investment, businesses should also prioritize staff training and culture...
Paul Heffernan: Understanding Your Company’s Endpoint Security Requirements
To determine your endpoint-security requirements, you must first understand your environment’s unique characteristics. Threat modeling, threat actor simulations, and metrics may also indicate whether there is a need for increased endpoint security. “There are...
Robert Hood: Moving Real-Time Forensics to the Endpoint
Securing endpoints involves protecting them, having analytical tools that make it easier to find legitimate endpoint incidents, and educating against social-engineering attacks. Endpoint-security solutions with back-end analytics engines generally based in the cloud...
Mike Santos: To Secure Security Funding, Get Quantitative
When making the case for security funding, it’s often effective to share quantitative information about specific risks that the business faces. Business conversations about how best to manage security risks should be ongoing, continuing after the tools have been...
Kevin Fielder: Be Aggressive in Protecting Your Endpoints
You need to have something in place that detects misbehavior as early as possible, and that can also be looking at the behavior of other systems. You can be aggressive with your endpoint response. It’s unlikely one person losing use of their machine for a short time...
Kalin Kingsland: Be Able to Utilize the Data Generated by Endpoint Security Tools
Whatever data you are capturing, it is important to have the means to process it and leverage it into meaningful risk mitigation. Striking the right balance between functionality, operational cost, and risk mitigation provides value to other parts of the business,...
John Meakin: Effective Deployment Depends on Understanding Your Threat Scenarios
Rather than searching for the perfect endpoint solution, begin by carefully thinking through the most likely threat scenarios that apply to your endpoint estate. The best approaches for securing the endpoint broadly fit into architecture where there’s an agent on the...
Isabel Maria Gomez: Effective Implementation Depends on Effective Communication
One of the biggest challenges is getting alignment within the organization on the kind of solution that best serves everyone’s needs. The solution provider needs to understand that the security team is going to develop rules for selecting the data that’s needed, and...
Harshil Parikh: Making the Case for an Endpoint Security Solution
A real-world demonstration can be helpful in making the case for why an endpoint-security solution is necessary from a risk-management perspective. Highlighting risk factors that are specific to the business is another effective way of making the argument for an...
Wayne Peterson: To Prevent Attacks, Start with the Endpoints
Businesses today must first secure their endpoints in order to have the greatest chance of fending off attacks. Once you have an endpoint-security strategy in place, you can optimize it with automated processes and smart data insights. “Today your most critical...