You've requested...

Share this with your colleagues:

Getting a handle on endpoint management

If a new window did not open, click here to view this asset.

Download this next:

Understanding behavioural detection of antivirus

This study assesses the behavioural detection engines of the antivirus in both the 32-bit and 64-bit versions of Windows 7 by using specialised modules to identify the technologies that the antivirus are using to monitor application behaviours. Our analysis revealed that the 64-bit versions of the antivirus are generally weaker than their 32-bit versions.

We also replayed the actions of both malware and legitimate applications from sandbox logs to the antivirus. This revealed what the antivirus software is monitoring and what activities trigger a reaction without other interference factors, such as white-listing to reduce false-positive detections on legitimate applications and black-listing to use traditional byte-matching signatures to detect known malware.

These are also closely related to: "Getting a handle on endpoint management"

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Malicious software, also known as malware, represents the profitable art of destruction, as it is able to do any kind of harm to a system in a stealthy manner, as well as to hide its existence. Furthermore, its rise has prevailed and there is no end in sight.

    Its most valuable tool, obfuscation, is mainly responsible for this achievement. Obfuscation techniques are applied to protect assets of malware for a limited time.

    In this article we look at the origins of obfuscation and its significance in malware design. We also highlight why it is important to continuously investigate obfuscation techniques and why we need a means to measure their effectiveness in evading detection mechanisms.

  • APAC guide to plugging endpoint security gaps

    In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices.

Find more content like what you just read:

  • UEM: The modern way to secure and manage your devices

    In this white paper find out how unified endpoint management can help your organization control and secure different devices across diverse platforms from a single console.

    Download

  • 4 areas where deep integration can improve endpoint security

    Endpoint devices continue to be one of the favorite targets for cyberattacks. To address this vulnerability, security leaders must integrate endpoint security into their network security architecture. In this white paper, learn how a deep connection between endpoint and network security offers key improvements to holistic enterprise protection.

    Download

  • Endpoint security buyer’s guide: The key areas for consideration

    Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.

    Download

  • Explore endpoint protection platforms

    Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.

    Download

  • What to consider when replacing your antivirus or endpoint protection solution

    Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.

    Download

  • 21 endpoint protection platform vendors & their core capabilities

    Endpoint protection is evolving to address security architecture tasks such as hardening, investigation, incident detection and incident response. In this Gartner analysis report, discover critical capabilities of Endpoint Protection Platform vendors and how their products stack up.

    Download

  • 5 areas that IT and cybersecurity professionals can address to ease their endpoint suffering.

    Traditional endpoint security has long been a crutch in the fight against hackers, but it just doesn't cut it anymore. Those tools rely on known malware signatures to be effective but they can't defend against zero-day attacks and new ransomware variants. In this blog post, discover 5 areas that you can address to ease your endpoint suffering.

    Download

  • Implementing a successful endpoint security program

    The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.

    Download

  • Endpoint detection and response: Top vendors

    This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.

    Download

  • IAM: Key to security and business success in the digital era

    As more organisations undergo digital transformation and cyber attackers increasingly target individuals as their way into the enterprise, identity and access management (IAM) has become a business challenge and has never been more important to the cyber defence, risk management and data protection capability of organisations.

    Download

  • Cyber Security 2016 and beyond

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

    Download

  • EDR: Why current tools aren’t enough

    Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.

    Download

  • Case study: Barclays’ IT security journey

    Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey. Read on to learn more.

    Download

  • Endpoint detection and response: Traditional vs Active

    As cyberattacks continue to grow in volume and complexity, it’s become more critical than ever for businesses to deploy active endpoint detection and response (EDR) to provide scalability and security to their various endpoints. This whitepaper discusses the differences and benefits of various EDR methods, read on to learn more.

    Download

  • Research report: Explore the endpoint protection platform market

    An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file based malware, to detect and block malicious activity, and to provide capabilities needed to respond to security incidents. This Gartner Peer Insights report provides peer reviews and ratings of EPPs. Download the report to explore the EPP market.

    Download

  • Software-Defined Networking Could Make Network-as-a-Service a Reality

    This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • How to balance security and productivity in a mobile world

    While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.

    Download

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

    In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.

    Download

  • The 2019 mobile threat landscape: Phishing, mobile malware, cryptojacking and more

    With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.

    Download

  • The great IAM - time to modernise?

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

    Download

  • Computer Weekly – 18 July 2017: Airbus secures critical infrastructure

    This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.

    Download

  • Focus: Securing new technology

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • The Global Risks Report 2016

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

    Download

  • How intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

    This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks

    Download

  • Email security: Never more important

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

    Download

  • Extracting actionable data from banking malware

    This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.

    Download

  • The difficulties of defending against web tracking

    This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.

    Download

  • Infographic: 2019 Europe IT Priorities - Datacentre

    In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download