article thumbnail

How to choose an endpoint protection suite

CSO Magazine

Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. Antivirus, more appropriately known as antimalware, has matured significantly since the days of dedicated antivirus servers, daily signature updates, and manually managed policies.

Antivirus 124
article thumbnail

BrandPost: How Much Risk Are You Willing to Take?

CSO Magazine

Just as the threat landscape evolves over time, so does security technology. Having been in the cyber security space for more than 15 years, I have witnessed a number of evolutions first hand.

Antivirus 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Webroot files patent infringement claim against Trend Micro

CSO Magazine

Security endpoint protection vendor Webroot has filed a patent infringement complaint against competitor Trend Micro accusing it of implementing patented technology in its security software and systems without authorization. To read this article in full, please click here

Marketing 126
article thumbnail

What is SIEM? Security information and event management explained

CSO Magazine

SIEM software (pronounced ‘sim’; the ‘e’ is silent) collects and aggregates log and event data generated throughout the organization’s technology infrastructure, from host systems and applications to network and security devices such as firewalls and antivirus filters.

Antivirus 122
article thumbnail

Bye-bye best-of-breed?

CSO Magazine

When I started working in cybersecurity 20 years ago, there were a few rock-solid security technology principles treated as gospel. One of those was the insistence on best-of-breed security technologies. Best-of-breed technologies were then combined as part of another time-honored principle—defense-in-depth.

article thumbnail

4 ways attackers target humans to gain network access

CSO Magazine

Every day, I see the failure in our technology. We hope that our antivirus or endpoint protection software alerts us to problems. When technology fails, it’s likely because the attacker made an end run around it by targeting humans. I’m sure you see it as well. In reality, it often does not. Here are four ways they do it.

article thumbnail

BrandPost: Measuring HP Sure Click Enterprise’s Return on Investment

CSO Magazine

HP Security – Sure Click Enterprise has transformed endpoint security with an innovative approach that leverages leading-edge isolation and micro-virtualization technology. To read this article in full, please click here