Top 5 Endpoint Security Solutions for Business

Bineesh Mathew | April 11, 2022 | 273 views

Top 5 Endpoint Security

“As more of our IT resources shift to the cloud, and more workers become mobile, the importance of endpoint security increases”

-Elliot Breukelman, Senior Information Security Engineer, Land O’Lakes, Inc

Endpoint security is a must to secure your business against cyber threats, but it is challenging for companies to implement and maintain it. According to Small Business Administration research around 88% of small business owners think they face cyberattacks.

Two significant factors contribute to this challenge:
  • The amplified use of mobile phones and tablets for office work
  • The rapid growth in the number of remote workers

These factors make it difficult for businesses, especially SMBs, to manage IT security.

So, the question is how the businesses will address the issue? The answer to this question is endpoint security software. This endpoint software protects all your servers, computers, and mobile devices, which are collectively known as endpoints, from cyberattacks.

Different features of endpoint security products help businesses meet diverse requirements. For example, some companies manage thousands of endpoints using endpoint security solutions, while others might want to use threat hunting tools.

Solo entrepreneurs and companies with their own SOC (security operations center) can utilize the best endpoint security software to safeguard their IT systems. Check out the list of the best solutions below that meet all your endpoint security requirements.


The Necessity of Endpoint Security Solutions for Businesses

All businesses need endpoint security software to protect computers and other IT assets from various cyberattacks. Cybercriminals think SMBs are easy targets; they are particularly vulnerable to cyberattacks than different types of businesses. Furthermore, as cybercriminals sophisticate themselves as technology improves, companies cannot think of running a business without endpoint security solutions.

Cybercriminals wreaking havoc on IT systems and stealing your data can be effectively stopped using the best endpoint security software. Find yourself in peace with the below listed advanced top 5 endpoint security solutions that can help you mitigate any cybersecurity risks.


Top 5 Endpoint Security Solutions for Businesses


McAfee Endpoint Protection

The McAfee endpoint protection system includes small business protection through its McAfee endpoint security platform. Also, the company offers a comprehensive range of security products for businesses of all kinds.

This platform's threat-prevention capabilities were perfect at blocking malware and zero-day attacks in test situations. McAfee endpoint security comes with essential features, including a firewall and the ability to prevent users from visiting infected websites. In addition, adaptive threat protection (ATP) is one of the standout characteristics of this platform.

With the help of ATP, McAfee endpoint security can detect all sorts of malware, even complex threats like file-less attacks. It looks at suspicious activity and decides what to do about it based on the McAfee Global Threat Intelligence network, reputation parameters, and risk criteria.

McAfee's ePolicy Orchestrator (ePO) assists IT teams in managing the security of the company.. Set security policies, examine and analyze endpoint status, take action when threats are discovered, and assess the overall health of your company's security with ePO as a central management platform.

 
Kaspersky Endpoint Security

Kaspersky Endpoint Security provides adequate and easy-to-manage malware protection for small organizations. Kaspersky Endpoint Security cloud is a preconfigured protection platform designed for enterprises with a small IT team and less than 100 employees. It allows for speedy implementation and continuously checks the security system.

Kaspersky's defenses blocked all malware and zero-day attacks in independent tests. Even on older devices, the technique works without affecting computer performance.

Reports and a dashboard provide endpoint security information through the platform. For example, you can find out where endpoint security vulnerabilities exist and what threats the platform has prevented. In addition, the monitoring dashboard has a Cloud Discovery tool that allows you to look at how your employees use external cloud services like Google Drive.


Microsoft Defender Antivirus

Before 2020, Microsoft was known to develop poor antivirus protection. The brand has worked hard to change this reputation. In 2020, the tech giant unveiled a revamped antivirus solution, Microsoft Defender Antivirus, which replaced the existing Windows Defender software. The malware prevention capabilities of the new system are impressive.

Over 13,000 malware samples were tested by AV-Test Institute, an independent testing organization. All of them were successfully blocked by Microsoft's solution. It also thwarted all zero-day threats, which exploit software flaws. This is better than the industry average of 98.9%.


Avast Business Antivirus Pro

Avast Business Antivirus Pro is a feature-rich antivirus explicitly designed for small and medium-sized businesses. It has a free trial version that is completely functional, allowing you to test the breadth and flexibility of this simple-to-use, simple-to-install tool.

SMBs and managed service providers (MSPs) who serve SMBs should consider Avast Business Antivirus Pro. SMBs can purchase the management console or the standalone version. All devices have the standalone version loaded and managed from the device.

It's a no-brainer alternative for SMBs with OS-agnostic networks, offering different versions for the modern Windows operating systems workstations, macOS, and Windows Server with Sharepoint compatibility. Avast also offers free versions and antivirus for Linux, which are not included in this evaluation.


Bitdefender GravityZone Business Security

Bitdefender GravityZone Business Security is a robust IT endpoint security solution that caters to the needs of small enterprises. More than 500 million endpoints worldwide are protected by GravityZone, which processes 11 billion queries every day and uses machine learning to assess and improve protection mechanisms.

It uses numerous layers of defense to prevent cyberattacks. This strategy integrates machine learning, heuristics, endpoint security analytics, browser-based security, event correlation, continuous monitoring of computer operations, and more to block malware and other threats from getting on the computer and causing harm.


The Future of Endpoint Security

Endpoint security is essential to run any business online. With the resurgence of ransomware, ignoring endpoint security is a prescription for catastrophe. Malware affects businesses of all sizes' reputations and bottom lines. Endpoint security platforms are used because of their endpoint detection and response (EDR) capabilities, application control, and other features.

Possible prospects on the future of endpoint security are:
  • Endpoint security switches to monitoring
  • Endpoint security merges with identity management
  • Endpoint security goes lightweight


Summing Up

When it comes to supervising workplace security, the correct endpoint security software boosts efficiency and productivity without jeopardizing safety. Endpoint security solutions also have lots of advantages that can help your company grow and thrive. Sensitive data, customer trust, and financial loss can be protected with endpoint security solutions.


Endpoint security solutions protect

Frequently Asked Questions


What do you mean by endpoint security?

Endpoint security is a method of defending endpoint devices, such as PCs, laptops, and mobile phones, from threats.


What are some of the examples of endpoints?

Any device that is physically an endpoint on a network is referred to as an endpoint. Endpoints include laptops, mobile phones, desktops, servers, tablets, and virtual environments.


What are some of the types of endpoint security solutions?

Some types of endpoint security are Internet of Things (IoT) security, antivirus solutions, endpoint detection and response, URL filtering, application control, network access control, browser isolation, and cloud perimeter security.

Spotlight

Chatsworth Products

At Chatsworth Products (CPI), it is our mission to address today’s critical IT infrastructure needs with products and services that protect your ever-growing investment in information and communication technology. We act as your business partner and are uniquely prepared to respond to your specific requirements with global availability and rapid product customization that will give you a competitive advantage. At CPI, our passion works for you.

OTHER ARTICLES
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

The Great CISO Resignation

Article | August 20, 2022

CISOs Are Leaving in Droves The Great Resignation has been front-page news since Covid lockdowns, with many employees looking for the work-life balance they enjoyed at the time. Now, the phenomenon has spread to the role of Chief Information Security Officer (CISO) and shows no signs of letting up. In fact, industry experts predict that it is likely to worsen. A recent study from cybersecurity company BlackFog found that 32% of CISOs in the U.K. and U.S. have considered leaving and many planned to do so in just six months. The majority noted that the top reason for leaving was a lack of work-life balance. The CISO role is demanding, with firefighting and frequent changes in regulations and customer expectations taking up significant time both on and off the job. In another recent study in which 581 CISOs were surveyed, the IANS Research and Artico Search explored CISO compensation and job satisfaction. Three-fourths of CISOs are satisfied with their job, which is 7% higher than in the 2021 sample and more than double that of the 2020 sample. The main drivers of satisfaction are compensation, budget, executive visibility, and organizational support. However, despite high satisfaction numbers, the study found that as many as 44% of respondents are considering a job change. CISO Challenges LIABILITY AND EXPOSURE OF THE CISO There is a perception that CISOs face heightened liability for cyber intrusions and the response to cyber events. One extraordinary example is the recent conviction of Uber’s former security officer, which represents the first time a security executive has faced federal crime prosecution over a data security response. In this case the finding was that he obstructed justice by concealing information about a breach, destroying data, and covering up the incident. CISOs are often in the hot seat when it comes to cyber-intrusions and how they are handled. The Board of Directors (possibly including named corporate officers) in most cases are protected by being diligent about the Business Judgement Rule (BJR). Heavily adopted in Delaware case law and since adopted in various forms in many states, this “rule” stipulates that proper oversight includes demonstrating the duty of loyalty (no conflicting interests) and duty of care (make informed decisions) to be protected from liability. There are few cases (although Enron being one) where liability was found but it was for illegalities and poor business judgment. Since CISOs are not named corporate officers in most cases, BJR does not provide comfort. Similarly, liability insurance which covers legal defense fees and cash judgments often covers only directors and named corporate officers unless the CISO has been specifically included in the policy. DUTY TO REPORT Improving Board-CISO Transparency There is a mechanism found in corporate governance best-practices for ensuring that the most senior people in an organization get direct, unfiltered input from a key executive, regardless of reporting structure. It is called the executive session. This is in common use by Boards of Directors who meet individually with the Chief Financial Officer, Controller, and other key executives, notably without other management in the room. Questions are intended to be penetrating and the respondent is expected to respond openly. Now that cybersecurity has risen to a top risk for the enterprise, the CISO position should be among those who appear individually in an executive session with the highest governing body of an enterprise at least annually. This addition to governance best-practices would give Board members and State governors unfiltered information on cybersecurity matters, thereby helping to fulfil their oversight responsibility. Bob Zukis, founder and CEO of the Digital Directors Network, reports that a survey of its membership of more than 900 IT, cyber, and boardroom leaders shows nearly half of the respondents already have some form of this policy in practice. However, this is still a minority of the overall CISO population, signaling more transparency between the CISO and Board is needed. CISOs in State Governments Government organizations also face many of these issues. Evidence shows that CISOs in state governments are as vulnerable to other job offers as CISOs in the private sector. In the span of eight days in October 2022, there were several reports of state CISOs resigning, including Oklahoma, Georgia, Pennsylvania, and North Dakota. [1] Legal liability is not an issue the government CISO needs to be worried about since governments and their employees are immune from legal suits. However, government CISOs are highly concerned about shouldering blame, especially in the press, for security intrusions or their coverup. As with private industry, state governments should also institute this recommended practice. NCC recommends CISOs be called upon to appear in an executive session with agency heads and even the governor at least once a year. The State of Texas, for example, already has a version of this policy implemented in a statute and in practice. Texas Administrative Code includes provisions for: Reporting, at least annually, directly to the agency head the status and effectiveness of the security program and its controls. Informing any relevant parties in the event of noncompliance with the state agency’s information security policies Resolving the Great CISO Resignation For organizations across the public and private sectors, cybersecurity has risen to one of the top risks and has increased the importance of the role of the CISO. Most are looking to improve their work-life balance and reduce some of the stressors of the job. While many CISOs are also concerned about trends in liability and becoming headline news for decisions made on the job, requiring CISOs to appear in executive sessions with board members or state governors can help to alleviate these concerns and improve CISO job satisfaction while at the same time improving how the most senior levels of organizations fulfil their responsibilities for oversight of top risks.

Read More
DATA SECURITY, ENTERPRISE SECURITY

Top 5 Application Security Trends Businesses Must Be Aware of in 2023

Article | November 22, 2022

Introduction Top 5 Trends for Businesses to Improve Their Existing Application Security 1.AppSec and Convergence 2.Adoption of Automated AI Security Capabilities 3.Emphasis on Securing the Software Supply Chain 4.Extreme 'Shift Left' 5.Upsurge in Demand for Vulnerability Prioritization Moving Forward with Application Security Introduction The proliferation of applications and their usage across the business landscape has made application security a strategic initiative that spans departments rather than an activity. Several factors are driving the rethinking of application security as a broader strategic program, including the evolving threat landscape, more incremental software development frameworks, and the adoption of nimbler. With the acceleration of software development and the greater-than-ever role of code in current business infrastructure, application security is shifting left in the process and infusing every step to ensure that the applications reaching customers' hands are secure and reliable. Top 5 Trends for Businesses to Improve Their Existing Application Security Applications serve as a doorway to servers and networks, making them an excellent target for malicious actors. Since cyber attackers constantly improve their techniques for breaking into software, it is becoming essential for businesses to gain insights into ever-evolving trends in the AppSec space. Here are some of the prominent trends that businesses should aware of to improve their existing application security. Trend 1: AppSec and CloudSec Convergence To accurately estimate attack surface and overall security posture, both application code vulnerabilities and cloud service hosting misconfigurations must be examined. The convergence of AppSec and CloudSec is becoming a critical component of modern security operations. It allows organizations to gain a comprehensive view of the attack surface and better understand the risks posed by application code and cloud service providers. By looking at these two areas cohesively, organizations can identify business-critical vulnerabilities and prioritize their remediation efforts. Trend 2: Adoption of Automated AI Security Capabilities The increasing volume and complexity of security threats pose significant challenges for organizations, causing strain on their threat detection and response capabilities. This leads to slower response times, higher costs, and a greater impact on security incidents. To address this issue, many companies are turning to security automation as a potential solution. One of such approaches involves the use of artificial intelligence (AI), which can automate data gathering, threat identification, and incident response processes. By adopting security automation, companies can optimize the use of limited security personnel and resources, enabling them to focus on high-value activities that provide maximum benefit to the organization. Trend 3: Emphasis on Securing the Software Supply Chain The software supply chain is emerging as a primary area of focus due to the heightened risks associated with software development. This urgency has been further compounded by the recent attack, such as Solarwind data breach and the Log4j attack on Apache, increasing the significance of software security measures. Companies are taking a more proactive approach for making enhancements in the software supply chain to protect their applications, including conducting Static Application Security Testing (SAST) to identify and address vulnerabilities before malicious actors can exploit them. Trend 4: Extreme 'Shift Left' The ‘shift left’ in software development has gained significant momentum in recent years. The idea behind this approach is to prioritize security and other critical aspects of software development at the earliest possible stage in the development process. By doing so, organizations can make more informed security decisions and identify and address security vulnerabilities before they cause any damage. As the pace of development continues to increase, organizations are increasingly adopting this approach in their software development processes to protect their systems and data from security risks. Trend 5: Upsurge in Demand for Vulnerability Prioritization Managing vulnerabilities in a software system requires analyzing vast amounts of data to determine issues that require immediate attention and prioritization. However, the growing presence of false positives is negatively impacting this process, resulting in decreased efficiency and wasted resources. Organizations are increasingly looking for vendors to provide vulnerability management tools that can reduce false positives, differentiate between low-priority issues and severe security threats, and offer actionable insights to mitigate them. Moving Forward with Application Security Applications security has become more critical than ever before for businesses in the current digital scape. With the attack surface constantly expanding and the frequency of threats on the rise, organizations must remain agile and employ the best effective strategies to protect their applications from potential cyberattacks. The significance of application security has not gone unnoticed. As organizations continue to invest in security measures, they are increasingly upgrading themselves as per emerging security trends to protect themselves against evolving cyber threats. This includes adopting the ‘shift left’ approach, tightening controls, and having a clear definition of remediation processes.

Read More
ENTERPRISE SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | August 2, 2022

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | February 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Spotlight

Chatsworth Products

At Chatsworth Products (CPI), it is our mission to address today’s critical IT infrastructure needs with products and services that protect your ever-growing investment in information and communication technology. We act as your business partner and are uniquely prepared to respond to your specific requirements with global availability and rapid product customization that will give you a competitive advantage. At CPI, our passion works for you.

Related News

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Uptycs Integrates with Amazon Security Lake to Enable the Correlation of its CNAPP and XDR Security Telemetry with a Vast Ecosystem of Security Tools

Prnewswire | June 01, 2023

Uptycs, provider of the first unified CNAPP and XDR platform, today announced an integration with Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes security data from across AWS environments, leading SaaS providers, on-premises, and cloud sources into a purpose-built data lake. Amazon Security Lake manages data throughout its lifecycle with customizable data retention settings and converts and conforms incoming security data to the Open Cybersecurity Schema Framework (OCSF) open standard, making it easier to automatically collect, combine, and analyze security data from AWS, security partners, and analytics providers. The integration with Uptycs helps organizations speed up threat detection and incident response by correlating Uptycs telemetry and events with data from a vast number of other security tools. With the proliferation of technologies and environments, security teams need to spend time setting up one-to-one integrations between their tools to correlate threat activity. This is expensive and delays response to security threats. In contrast, a shift up approach to cybersecurity does not need complex integrations and intermediary systems to connect the dots. The premise involves getting the data in a standardized format right out of the gate, and streaming it up into a data lake so security teams can do cross-correlations that speed up threat detection and response. The OCSF project offers a consistent approach towards cybersecurity telemetry by providing a standard schema for common security events, defining versioning criteria to facilitate schema evolution, and including a self-governance process for security log producers and consumers. This enables organizations to easily bring together data from multiple security tools. "We are excited to bring the security telemetry from Uptycs into Amazon Security Lake," says Ganesh Pai, CEO and co-founder of Uptycs. "A key tenet of the shift up approach to cybersecurity is to stream normalized security telemetry into a data lake, moving security analytics processing power to the cloud. Uptycs and AWS customers can now enjoy enhanced protection and faster reaction time as they benefit from standardized OCSF-based telemetry across their on-prem and cloud workloads." Using the OCSF format, Uptycs and Amazon Security Lake allow organizations to have a consistent telemetry, enabling them to easily correlate data from a variety of security, SIEM, and SOAR tools. Uptycs, an AWS Security Competency Partner, will send a wealth of OCSF-formatted data from on-premises and cloud assets to Amazon Security Lake, including behavioral threat detections from endpoints and cloud workloads, anomaly detections, policy violations, risky policies, misconfigurations, and vulnerabilities. Uptycs prospects and customers can get started with the Amazon Security Lake integration by contacting Uptycs. About Uptycs Your developer's laptop is just a hop away from cloud infrastructure. Attackers don't think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers? Uptycs reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across your modern attack surface—all from a single platform, UI, and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, thus delivering a more cohesive enterprise-wide security posture.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Malwarebytes is the Most Effective Endpoint Protection According to Independent Third-Party Research Lab

Prnewswire | April 06, 2023

Malwarebytes, a global leader in real-time cyber protection, today announced that MRG Effitas, a world leader in independent IT research, gave Malwarebytes Endpoint Protection (EP) the highest possible score (100%) for the sixth consecutive quarter in its antivirus efficacy assessment. As of the latest Q4 2022 test results, Malwarebytes is the only vendor to win every MRG Effitas certification and award, outperforming other solutions in its ability to spot and stop zero-day threats, ransomware, banking malware, fileless attacks and exploits. The results underscore the company's ability to stay ahead of today's evolving threats through continuous product innovation. "The threat landscape isn't static, and Malwarebytes believes cybersecurity protection shouldn't be either," said Joe Hartmann, Senior Director of Threat Labs at Malwarebytes. "The results of this third-party test underscore the criticality of staying on top of today's threat techniques and building products that take advantage of proactive protection technologies, such as machine learning, that can spot and stop known, in the wild attacks, and zero-day threats. Delivering 100% efficacy with zero false positives is icing on the cake for most IT admins." MRG Effitas is an independent research and testing lab that evaluates endpoint protection solutions. In its latest report, MRG Effitas recognized Malwarebytes EP for its advanced security capabilities, particularly in detecting and preventing complex malware attacks. The signature and behavior-based detection techniques and proprietary anti-exploit technology of Malwarebytes EP allowed it to detect and block more malware than any other competitor in the Q4 tests. MRG Effitas Q4 2022 360° Assessment awarded Malwarebytes certificates in: Level 1 – Malwarebytes EP automatically blocked 100% of in-the-wild malware samples and prevented a simulated Botnet attack. Exploit – MRG Effitas used exploits in vulnerable applications attempting to deliver a malicious payload on a device with Malwarebytes EP. Malwarebytes autoblocked 100% of exploit/fileless attacks, protecting the system from infection. Online Banking – MRG Effitas simulated the Magecart credit card-skimming attack with Malwarebytes EP autoblocking 100% of the seven financial malware samples. Ransomware – MRG Effitas tested security products for 92 ransomware samples and three benign programs designed to mimic ransomware behavior. Malwarebytes blocked 100% of ransomware threats without any false positives, allowing the three benign programs to run. Android 360-degree – MRG Effitas conducted a separate assessment for Android devices, with Malwarebytes earning a perfect 100% score. "Malwarebytes' outstanding performance in detecting a wide range of threats across multiple attack vectors is a testament to its effectiveness," said MRG Effitas CEO Chris Pickard. "Collaboration with third-party testers like us helps drive innovation in protection. Malwarebytes' results underscore the effectiveness and importance of leveraging machine-learning driven processes to combat novel forms of malware and prevent false positives." About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes' award-winning endpoint protection, privacy and threat prevention solutions and its world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe. The effectiveness and ease-of-use of Malwarebytes solutions are consistently recognized by independent third parties including MITRE Engenuity, MRG Effitas, AVLAB, AV-TEST (consumer and business), Gartner Peer Insights, G2 Crowd and CNET. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Uptycs Integrates with Amazon Security Lake to Enable the Correlation of its CNAPP and XDR Security Telemetry with a Vast Ecosystem of Security Tools

Prnewswire | June 01, 2023

Uptycs, provider of the first unified CNAPP and XDR platform, today announced an integration with Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes security data from across AWS environments, leading SaaS providers, on-premises, and cloud sources into a purpose-built data lake. Amazon Security Lake manages data throughout its lifecycle with customizable data retention settings and converts and conforms incoming security data to the Open Cybersecurity Schema Framework (OCSF) open standard, making it easier to automatically collect, combine, and analyze security data from AWS, security partners, and analytics providers. The integration with Uptycs helps organizations speed up threat detection and incident response by correlating Uptycs telemetry and events with data from a vast number of other security tools. With the proliferation of technologies and environments, security teams need to spend time setting up one-to-one integrations between their tools to correlate threat activity. This is expensive and delays response to security threats. In contrast, a shift up approach to cybersecurity does not need complex integrations and intermediary systems to connect the dots. The premise involves getting the data in a standardized format right out of the gate, and streaming it up into a data lake so security teams can do cross-correlations that speed up threat detection and response. The OCSF project offers a consistent approach towards cybersecurity telemetry by providing a standard schema for common security events, defining versioning criteria to facilitate schema evolution, and including a self-governance process for security log producers and consumers. This enables organizations to easily bring together data from multiple security tools. "We are excited to bring the security telemetry from Uptycs into Amazon Security Lake," says Ganesh Pai, CEO and co-founder of Uptycs. "A key tenet of the shift up approach to cybersecurity is to stream normalized security telemetry into a data lake, moving security analytics processing power to the cloud. Uptycs and AWS customers can now enjoy enhanced protection and faster reaction time as they benefit from standardized OCSF-based telemetry across their on-prem and cloud workloads." Using the OCSF format, Uptycs and Amazon Security Lake allow organizations to have a consistent telemetry, enabling them to easily correlate data from a variety of security, SIEM, and SOAR tools. Uptycs, an AWS Security Competency Partner, will send a wealth of OCSF-formatted data from on-premises and cloud assets to Amazon Security Lake, including behavioral threat detections from endpoints and cloud workloads, anomaly detections, policy violations, risky policies, misconfigurations, and vulnerabilities. Uptycs prospects and customers can get started with the Amazon Security Lake integration by contacting Uptycs. About Uptycs Your developer's laptop is just a hop away from cloud infrastructure. Attackers don't think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers? Uptycs reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across your modern attack surface—all from a single platform, UI, and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, thus delivering a more cohesive enterprise-wide security posture.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution. The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats. However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses. To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by: Automatically scanning organizational endpoints with minimal performance impact Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow. "We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform." “We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.” By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape. About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes. About Ivanti Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Malwarebytes is the Most Effective Endpoint Protection According to Independent Third-Party Research Lab

Prnewswire | April 06, 2023

Malwarebytes, a global leader in real-time cyber protection, today announced that MRG Effitas, a world leader in independent IT research, gave Malwarebytes Endpoint Protection (EP) the highest possible score (100%) for the sixth consecutive quarter in its antivirus efficacy assessment. As of the latest Q4 2022 test results, Malwarebytes is the only vendor to win every MRG Effitas certification and award, outperforming other solutions in its ability to spot and stop zero-day threats, ransomware, banking malware, fileless attacks and exploits. The results underscore the company's ability to stay ahead of today's evolving threats through continuous product innovation. "The threat landscape isn't static, and Malwarebytes believes cybersecurity protection shouldn't be either," said Joe Hartmann, Senior Director of Threat Labs at Malwarebytes. "The results of this third-party test underscore the criticality of staying on top of today's threat techniques and building products that take advantage of proactive protection technologies, such as machine learning, that can spot and stop known, in the wild attacks, and zero-day threats. Delivering 100% efficacy with zero false positives is icing on the cake for most IT admins." MRG Effitas is an independent research and testing lab that evaluates endpoint protection solutions. In its latest report, MRG Effitas recognized Malwarebytes EP for its advanced security capabilities, particularly in detecting and preventing complex malware attacks. The signature and behavior-based detection techniques and proprietary anti-exploit technology of Malwarebytes EP allowed it to detect and block more malware than any other competitor in the Q4 tests. MRG Effitas Q4 2022 360° Assessment awarded Malwarebytes certificates in: Level 1 – Malwarebytes EP automatically blocked 100% of in-the-wild malware samples and prevented a simulated Botnet attack. Exploit – MRG Effitas used exploits in vulnerable applications attempting to deliver a malicious payload on a device with Malwarebytes EP. Malwarebytes autoblocked 100% of exploit/fileless attacks, protecting the system from infection. Online Banking – MRG Effitas simulated the Magecart credit card-skimming attack with Malwarebytes EP autoblocking 100% of the seven financial malware samples. Ransomware – MRG Effitas tested security products for 92 ransomware samples and three benign programs designed to mimic ransomware behavior. Malwarebytes blocked 100% of ransomware threats without any false positives, allowing the three benign programs to run. Android 360-degree – MRG Effitas conducted a separate assessment for Android devices, with Malwarebytes earning a perfect 100% score. "Malwarebytes' outstanding performance in detecting a wide range of threats across multiple attack vectors is a testament to its effectiveness," said MRG Effitas CEO Chris Pickard. "Collaboration with third-party testers like us helps drive innovation in protection. Malwarebytes' results underscore the effectiveness and importance of leveraging machine-learning driven processes to combat novel forms of malware and prevent false positives." About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes' award-winning endpoint protection, privacy and threat prevention solutions and its world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe. The effectiveness and ease-of-use of Malwarebytes solutions are consistently recognized by independent third parties including MITRE Engenuity, MRG Effitas, AVLAB, AV-TEST (consumer and business), Gartner Peer Insights, G2 Crowd and CNET. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Events