1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Three ways to use the cloud to regain control over network endpoints

Discussion in 'Network World' started by RSS, Dec 23, 2015.

  1. RSS

    RSS New Member Member

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

    The dramatically increased persistence and creativity of attackers call for an equally radical change in how businesses protect themselves. Promising new cloud-based endpoint security solutions can meaningfully change how we protect against cyber intrusions. Here's how you can leverage the cloud to regain control over endpoints:

    1. The cloud can enable enterprises to keep tabs on and learn from attackers as they test attack strategies. Today’s adversaries often have the resources to buy traditional security software, network appliances and virtually any other on-premise solution to figure out how they tick. By re-creating mock networks and endpoint protection systems of victims they target, they can find ways to bypass defenses. Given that on-premise defenses are by design downloaded and available locally, they are naturally exposed to attacker scrutiny-- and without tipping off the vendor or the intended victim.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page