IT Distribucija s osobnošću

Endpoint Detection and Response Demystified

For years, Antivirus (AV) solutions were the major players on protecting customer endpoints. But as the threat landscape has shifted, we’ve seen the emergence of newer solutions built to deal with some of the problems inherent in AV.

You may have heard the term “endpoint detection and response (EDR)” crop up over the past few years. These solutions were put on the market specifically to adapt to the evolution of the threat landscape. Replacing your AV product with EDR is definitively a step in the right direction, but choosing the right product is not an easy task. You are for sure wondering about how effective these solutions are in addressing the real-world threats.

Altaro VM Backup Workshop - Best Practice, Tipps & Tricks

In case you haven't joined our latest Altaro workshop you can still see the recording here. In this session we took a deep dive under Altaro VM Backup surface with Dr. Carsten Haak, shared few tips, tricks and best practice examples.

 

BlackFog - Hafnium Exchange Hack Case Study

Find out how BlackFog prevented #dataexfiltration​ and detected Microsoft Exchange Server hack before it really became a thing.

 

In this special session we took a deep dive with BlackFog's VP of Business Development, Thomas T. Madsen, as he analyzed security breach that happened few weeks ago to IT Service provider that along with other solutions, uses #BlackFog​ to protect their clients from data loss. Even with having several different security layers in place the whole system was compromised, but attackers were not able to exfiltrate any data as BlackFog kept all gates closed leaving them empty handed.

 

During this session we have also explained how to minimize cyber security issues by focusing on data privacy for endpoints and by applying multiple layers of security around it (geo blocking, suspicious address blocking, malwaretising, social media, fake news, profiling, dark web control etc.).

Where to find and access N-able partner resources

In this short video you will find more details about N-able partner resources and where to find them.

 

Five Cyberthreats that Slip Past Traditional Antivirus

Many traditional antivirus (AV) programs operate on signatures—as malicious software is discovered, a signature describing the file is generated, added to a database, then the database gets pushed out to the customer base. That basically means that you are waiting for malware to strike first, hoping that your AV vendor is fast enough and can issue new definitions before that threat reaches you. In some cases this might work fine, but today we face more sophisticated types of malware that are smart enough to bypass standard AVs. In this eBook you can find more details about these types of malware and why standard AV products are simply no match for them.

 

<< < Stranica 1 od 6 > >>