From The Desk Of Charles Leaver CEO Ziften Technologies
With the advent of bring your own device (BYOD) methods and cloud computing the protecting of specific endpoints has ended up being more difficult, as administrators could be making ease of data access a priority over security. The threats exist however, since the majority of the current generation of endpoint security software have not been modified to protect from aggressive hacking and malicious cyber attack strategies that target individual endpoints as the launch pad for attacks that are widely distributed.
There was a really famous endpoint attack that happened in recent times where a malware strain named Comfoo was used to jeopardize the networks of many multinational organizations back in 2010. The Comfoo malware included a number of custom designed backdoor Trojans and exploits that might constantly disperse malware. A more major effect was that this malware could cause destructive data leaks by scraping account and network info and monitor all user input, according to CRN contributor Robert Westervelt. It is thought that the Comfoo malware could have been a part of an advanced cyber espionage project, because of the methodology that was used and the evasion of standard endpoint monitoring.
Utilizing email phishing and social engineering the malware was able to compromise targeted devices, which highlights how ripe endpoints have ended up being for malware infiltration, so says Jason O’Reilly, security executive. When he was talking to ITWeb, O’Reilly said that conventional endpoint software does not adequately account for access from places beyond the IT department the majority of the time, and it does not limit data exposure to authorized parties through the use of access controls.
O’Reilly mentioned that “endpoint security services need to provide layered protection that surpasses signature-based detection just to consist of heuristic-based detection and polymorphic-based detection.” “Today’s networks are exposed to threats from many different sources.”
Real Time Threat Catching And Report Generation
The high stakes for control strategies and endpoint security were recognized by business consulting company Frost & Sullivan, as they felt both of these areas were under pressure from both external attackers and the insatiable demand from staff members for gadget choice versatility.
Chris Rodriguez, Frost & Sullivan analyst stated “business IT organizations now deal with tremendous pressure to make it possible for workers to access the corporate network and files from their own individual devices.” “Considering their seemingly universal nature, fast data connections, and effective hardware and os, these gadgets represent prime targets for hackers.”
When asked exactly what companies can do to tighten up on the special weak points of mobile hardware, O’Reilly suggested that any solutions need to supply clear and extensive visibility into what is happening on each endpoint so that action can be taken rapidly when any risks are detected.