Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

The Top 5 Myths of Next-Gen Endpoint Protection


‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple threat protection techniques working in synergy is the key to this.

But it can be tough finding the time to pick through the marketing FUD to find the solution that will deliver the best protection. So let’s consider five common myths associated with next-gen endpoint protection.

Myth #1: Next-gen Endpoint Protection = machine learning

Machine learning is good at blocking threats hidden in executable files, but struggles in detecting threats hidden in non-executable files, such as malicious scripts in PDFs or Word documents. There are many different threats out there i.e. ransomware, browser exploits, zero-day threats and you need many different protection techniques working together to deflect them. Other techniques, working in concert with machine learning, like web reputation, behavioral analysis, sandboxing, application control and vulnerability shielding are also critical to ensuring you have the best protection against the broadest range of threats.

Myth #2: Next-gen solutions deliver ‘unbelievable’ protection

Some new vendors are making bold claims for their products and present incredible results. Frankly they are unbelievable, as the results come out of testing where the vendors control all parameters, including threats tested, and configuration of competitive products. When tested by reputable, independent organizations like AV-Test, their results simply don’t measure up.

Myth #3: Endpoint is the best place to stop threats

Endpoint protection is key but many threats can be blocked at the web or email gateway before they ever make it to your endpoint, leaving your endpoint security to focus on the most sophisticated threats. Web and email security should work in concert with endpoint protection, sharing threat intelligence and giving you a holistic view of what is happening across every threat vector.

Myth #4: All you need to do is prevent threats

The reality is, no vendor can protect you from 100% of threats. That’s why you need tools to not only detect threats but recover from them as well. And you need security which can adapt so next time those threats are encountered they’ll be prevented. This can only be achieved if the layers of your endpoint protection solution share intelligence, which is difficult to achieve when you’re using point products from multiple vendors.

Myth #5: Only risky start-ups provide next-gen protection

Many small start-ups make lots of market noise that their technology is the silver bullet to solve all your endpoint security problems. But protecting your organization is about more than any one technology. Customers value a proven endpoint security partner like Trend Micro, which continually evolves its endpoint protection solutions, the Smart Protection Suites adding new capabilities such as machine learning to protect against the changing threat landscape. That’s why our customers trust us to protect more than155 million endpoints worldwide, and why you know we will be there tomorrow, when many of these start-ups will be a distant memory.

Viewing all articles
Browse latest Browse all 12749