Like what you see so far?

Sign up for our newsletter and get great content delivered straight to your inbox.

Posted May 17, 2017 in Security

ZeroDay EndPoint Protection

Securing the enterprise against malicious actors requires multiple components in today’s threat landscape. This is commonly labeled as “Defence in Depth” and describes how layering defence capabilities are important in protecting the environment. There are many layers that contribute to a wide coverage for defending against attacks. Let’s look at the network and the host.

How to set up Defence in Depth:

The network portion is generally the first line of defence when protecting an environment. Platforms like NGFW, UBA, and WAF all serve a purpose, but in some cases, can be evaded through various means.  Encryption and obfuscation are some examples of how network protections can be bypassed which leads to the potential for the host to be compromised.

This drives the requirement to harden and deploy security technologies on the host in the event one of these controls is evaded. One of the most crucial components for your endpoints should be an anti-malware/anti-exploit solution. This is the bare minimum for defending against the many threats your organization faces every day. Like most targeted campaigns the attacks are often complex and so is managing the security of your endpoints. That’s why we recommend outsourcing your zeroday endpoint protection.

Cylance ZeroDay EndPoint Managed Protection:

Scalar has chosen to partner with Cylance to deliver its managed zeroday endpoint platform. The decision to support Cylance required rigorous testing and benchmarking against the biggest players in the industry. They approach a difficult problem with an intelligent methodology. Here’s why I believe in Cylance as a best of breed solution for managed endpoint:

  • Multi-OS support
  • Cloud based management and deployment
  • Minimal updating required
  • Strong offline capabilities
  • Behaviour based prevention (machine learning)
  • Anti-malware/anti-exploit platform
  • Application whitelisting
  • Device Control
  • Strong reporting capabilities

Why outsource IT Services?

Enterprise security is specialized and requires a significant investment in individuals, technology, and time. Many organizations find it beneficial to outsource these specific portions of their IT operations to a trusted partner. This can result in seeing reduced operating costs for the client as spending becomes more predictable. Clients can leverage a team of Platform Specialists and take advantage of fast response times to gain piece of mind.

There is no silver bullet against stopping all malicious attacks targeting your infrastructure.  Attention to detail, endpoint hardening, and adding other layers of defence are some of the most critical first steps you should take toward protecting your organization from attacks.  Working with the team at Scalar, you have access to experts in the fields of network and endpoint security, risk and compliance, and security communication, and education.  We can help you assess whether managed zeroday endpoint protection is right for your organization.

 

Looking for a second opinion on your current endpoint stack? Reach out to the Scalar team!

Contact Us