Bitdefender

Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet the growing needs to protect endpoints. In this episode we get to conduct a deep dive on the structure of malware and how the malware has evolved to continue infiltrating organization and cause mass data leaks, denial of services and disruption of business operations. Over the last decade malware was deployed using social engineering techniques and removable devices. This has advanced to...

Read more...

ENDPOINT SECURITY PROTECTION USING BITDEFENDER

From various sources on the internet, endpoint security has been demystified in various meanings which lead to its popularity in Information Security. Endpoint Security can be therefore termed as protection of data and computing devices from threats and vulnerabilities, where the devices could be smartphones, tablets, laptops, IoT and other wireless devices with the capability of processing data. For businesses to cope, there has been increased adoption of new technologies and greater innovation by device manufacturers, which has enabled...

Read more...

Evolution of Antimalware Technologies

Over 500,000,000 malware threats have been detected in the last decade, this can be evidenced by cyber statistics reported by multiple sources including National KE-CIRT. The malware variants detected have been mutating rapidly making it difficult for Security Analysts to secure the environment against malware attacks. The technologies implemented had to also be refined and upgraded to be able to prevent, detect and respond to malware threats. In this article, we will be understanding the various components utilized by traditional...

Read more...

A BRIEF HISTORY AND CURRENT TRENDS OF EDR (Endpoint Detection and Response)

The term EDR stands for Endpoint Detection and Response. It was coined by Anton Chuvakin of Gartner in 2013. It refers to tools primarily focused on detecting and investigating suspicious activities and other problems on hosts/endpoints such as PCs used by end-users. EDR software gathers data from endpoint devices and then analyzes the data to reveal potential cyber threats and issues Organisations used antivirus systems until early 2012 when this technology transitioned to EDR. This transition was informed by attackers developing...

Read more...

Mobile Security and Information Security

According to www.statistica.com, the internet, mobile security has been demystified in various meanings which lead to the Information Security description. Mobile Security can be therefore termed as protection of data and computing devices from threats and vulnerabilities, where the devices are smartphones, tablets, laptops, and other wearable devices with the capability of processing data. Due to the emergence of Bring Your Own Device policies in an organization, cloud computing, and other technologies, we have seen organizations allowing their staff...

Read more...
×

Hello, Thank you for contacting Sentinel Africa. How may i assist you?

× WhatsApp for Enquiry