New technologies such as containerized applications are driving innovation and productivity like never before, but with these advancements come some concerns. As adoption of containerized applications in production rises, so should concerns about security best practices. Today’s attacks move fast, often in seconds rather than minutes or hours,
While we were exhibiting and presenting at Black Hat in August, we heard from many booth visitors how important support and service are to them. While that doesn’t come as a surprise, we were alarmed to hear they regularly spend hours on the phone trying to make their chosen endpoint security solution work effectively. It just shouldn’t be like
How MSSPs Can Benefit from Multi-tenancy Features in Endpoint Security Platforms
Multi-tenancy management is a critical capability/function for MSSPs because it enables them to manage multiple environments for multiple clients (many of whom are SMBs) from a single pane of glass. Moreover, multi-tenancy allows for easier and more efficient
Visibility is just the beginning:
Visibility is the key starting point to any security stack. It’s a lot easier to defend against something you can see. This is why detection is at the beginning of any incident response playbook. However, with the spread of today’s high-velocity attacks, visibility and awareness may fail you in ways you don’t
As you may know, Gartner released its Magic Quadrant for Endpoint Protection Platforms this week, and we are honored to be included along with 23 other leading endpoint security vendors. We’re thrilled to be highlighted in the Honorable Mentions section with three other successful, forward-looking companies.
Version 4.0 is a key part of our mission to protect businesses around the world from data breaches and disruption caused by cyber attacks. It squarely addresses the challenge faced by security and operations teams of combating the growth in the attack surface created by rising numbers of vulnerabilities and devices. We’ve added predictive and
In 2017 we said, "By now everyone knows about WannaCry and the problem with unpatched systems. But, what happens when the next Windows vulnerability is released, and no patch is issued on an end-of-life product?" That moment might have arrived.
enSilo CEO Roy Katmor and CTO Udi Yavo delivered an in-depth presentation at RSA Conference 2019 called “The New Gold Rush: How to Hack Your Own Best Mining Rig”. The session addressed the state of cryptominers versus ransomware, how to build a stealthy and well-distributed miner, and several miner detection methods. Also, the team unveiled
Towards the end of 2018, enSilo blocked a suspicious attack attempt originating from a generic PowerShell script. While investigating the attack our team discovered an interesting loader malware that delivers different payloads. During the time of writing this post, commercial Anti-Viruses (AVs) did not identify this script as hostile.