Threats Have Modernized. Has Your Endpoint Security?

Eila Shargh

Category: Endpoint

Signature-based approaches to endpoint security were sufficient when targeted malware and malware variants occurred in small numbers. But today, exploits successfully evade signature-based defenses as they typically target vulnerabilities and deliver sophisticated malware. Most endpoint security technology is now outdated.

These evasive threats require advanced protection. IDC, in a recent Technology Spotlight sponsored by Palo Alto Networks, “The Patient Zero Problem and the Need for Modern Endpoint Protection,” has outlined an approach for modern-day endpoint security.

Rules for Modern Endpoint Security:

  • Signature-less approach – Endpoint security products that utilize a signature-less approach are more capable of preventing targeted malware and malware variants, zero-day threats and non-malware tactics.
  • Continuous protection – Advanced endpoint solutions should continuously provide protection to identify new and evasive threats.
  • Endpoint agent functionality – As endpoints continue to become more mobile and remote, endpoint security solutions should be able to provide protection regardless of connectivity to the network and with minimal performance degradation.
  • Solve the enterprise use case – Advanced endpoint solutions should offer a multilayered approach in a single offering while alleviating cumbersome configuration, updates and management issues typically caused by numerous point products.
  • Standards compliant – Endpoint security solutions should meet compliance regulations and standards today as well as more stringent future requirements. Customers should consider the long-term ability of an organization to meet these future needs.

These rules outline necessary capabilities and features for a modern endpoint security solution capable of preventing today’s sophisticated threats. For a more comprehensive look at IDC’s Rules for Modern Endpoint Security, read the IDC Technology Spotlight.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.