Three Key Considerations for Excellent Service and Support

enSilo Corporate and Product

While we were exhibiting and presenting at Black Hat in August, we heard from many booth visitors how important support and service are to them. While that doesn’t come as a surprise, we were alarmed to hear they regularly spend hours on the phone trying to make their chosen endpoint security solution work effectively. It just shouldn’t be like

Read More

How MSSPs Can Benefit from Multi-tenancy Features in Endpoint Security Platforms

enSilo Corporate and Product

How MSSPs Can Benefit from Multi-tenancy Features in Endpoint Security Platforms

Multi-tenancy management is a critical capability/function for MSSPs because it enables them to manage multiple environments for multiple clients (many of whom are SMBs) from a single pane of glass. Moreover, multi-tenancy allows for easier and more efficient

Read More

New from enSilo: IoT Discovery and Protection

enSilo Corporate and Product

Visibility is just the beginning:

Visibility is the key starting point to any security stack. It’s a lot easier to defend against something you can see. This is why detection is at the beginning of any incident response playbook. However, with the spread of today’s high-velocity attacks, visibility and awareness may fail you in ways you don’t

Read More

Gartner Magic Quadrant Report for Endpoint Protection Platforms

enSilo Corporate and Product

As you may know, Gartner released its Magic Quadrant for Endpoint Protection Platforms this week, and we are honored to be included along with 23 other leading endpoint security vendors. We’re thrilled to be highlighted in the Honorable Mentions section with three other successful, forward-looking companies. 

Read More

Seconds Count in Endpoint Security: Why Real Time Matters

If you’ve ever played a ball game, say basketball or baseball, you know that if you drop the ball, you’ve lost the chance to score and maybe even win the game. The same can be said in endpoint security. If you don’t react immediately, you lose the chance to contain and mitigate the threat so it does not move laterally throughout the

Read More

DejaBlue - Multiple Wormable RDS vulnerabilities affecting latest windows versions

enSilo Corporate and Product

On the latest Patch Tuesday, August 13th, Microsoft disclosed multiple pre-authentication remotely exploitable vulnerabilities in Windows remote desktop services (RDS). This means that the vulnerabilities can be exploited without any authentication or user interaction.
Read More

DealPly Revisited: Leveraging Reputation Services To Remain Under The Radar

Research, enSilo Breaking Malware

Usually, Adwares are not a particularly interesting research subject. However, when we detected a DealPly variant that evaded AV detection we decided to dig deeper.

Read More

GandCrab Doppelgänged His Shell?

Malware, enSilo Breaking Malware, Process Doppelganging, Threat Intelligence

A new loader-type malware adopted a technique similar to Process Doppelgänging and spread like wildfire in the last year and half. This loader is a significant threat, besides GandCrab, that closed up shop earlier this year, it delivers over a dozen other payloads like FormBook, LokiBot, SmokeLoader, AZORult, NetWire, njRat and Pony stealer.

Read More

The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable

Malware, enSilo Breaking Malware, Threat Intelligence

Article Summary

In May 2019, enSilo’s Threat Intelligence team observed activity by a cybercrime group, spreading Metamorfo - A Brazilian banking trojan. The variants we discovered abuse an executable digitally signed by Avast, which is one of the most popular AV products in the world for consumers. We were able to connect this activity to a

Read More

Unveiling Version 4.0 of the enSilo Endpoint Security Platform

enSilo Corporate and Product

Version 4.0 is a key part of our mission to protect businesses around the world from data breaches and disruption caused by cyber attacks. It squarely addresses the challenge faced by security and operations teams of combating the growth in the attack surface created by rising numbers of vulnerabilities and devices. We’ve added predictive and

Read More