While we were exhibiting and presenting at Black Hat in August, we heard from many booth visitors how important support and service are to them. While that doesn’t come as a surprise, we were alarmed to hear they regularly spend hours on the phone trying to make their chosen endpoint security solution work effectively. It just shouldn’t be like
How MSSPs Can Benefit from Multi-tenancy Features in Endpoint Security Platforms
Multi-tenancy management is a critical capability/function for MSSPs because it enables them to manage multiple environments for multiple clients (many of whom are SMBs) from a single pane of glass. Moreover, multi-tenancy allows for easier and more efficient
Visibility is just the beginning:
Visibility is the key starting point to any security stack. It’s a lot easier to defend against something you can see. This is why detection is at the beginning of any incident response playbook. However, with the spread of today’s high-velocity attacks, visibility and awareness may fail you in ways you don’t
As you may know, Gartner released its Magic Quadrant for Endpoint Protection Platforms this week, and we are honored to be included along with 23 other leading endpoint security vendors. We’re thrilled to be highlighted in the Honorable Mentions section with three other successful, forward-looking companies.
If you’ve ever played a ball game, say basketball or baseball, you know that if you drop the ball, you’ve lost the chance to score and maybe even win the game. The same can be said in endpoint security. If you don’t react immediately, you lose the chance to contain and mitigate the threat so it does not move laterally throughout the
Usually, Adwares are not a particularly interesting research subject. However, when we detected a DealPly variant that evaded AV detection we decided to dig deeper.
A new loader-type malware adopted a technique similar to Process Doppelgänging and spread like wildfire in the last year and half. This loader is a significant threat, besides GandCrab, that closed up shop earlier this year, it delivers over a dozen other payloads like FormBook, LokiBot, SmokeLoader, AZORult, NetWire, njRat and Pony stealer.
In May 2019, enSilo’s Threat Intelligence team observed activity by a cybercrime group, spreading Metamorfo - A Brazilian banking trojan. The variants we discovered abuse an executable digitally signed by Avast, which is one of the most popular AV products in the world for consumers. We were able to connect this activity to a
Version 4.0 is a key part of our mission to protect businesses around the world from data breaches and disruption caused by cyber attacks. It squarely addresses the challenge faced by security and operations teams of combating the growth in the attack surface created by rising numbers of vulnerabilities and devices. We’ve added predictive and