{"id":35743,"date":"2020-06-05T03:57:17","date_gmt":"2020-06-05T07:57:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=35743"},"modified":"2021-08-02T06:56:55","modified_gmt":"2021-08-02T10:56:55","slug":"switching_cybersecurity_questions","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/switching_cybersecurity_questions\/35743\/","title":{"rendered":"10 questions to find out if your endpoint security measures up"},"content":{"rendered":"<p>The digital perimeter around businesses has changed a lot in the past decade, with cloud computing, bring-your-own-device (BYOD) and the internet of things (IoT,) to name but a few. For many, this has meant a radical rethink of their endpoint protection. Companies might do the same because they\u2019ve outgrown their provider or lost trust when the protection has let them down.<\/p>\n<p>If you\u2019re thinking about changing your cybersecurity dance partner while you\u2019re in good company, it\u2019s important to think through your decision. And it\u2019s important to take stock and question if your current solution is going to be good enough to face oncoming threats. <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/06\/05032940\/196_KES_Cloud_Marketing_Whitepaper_Time_to_switch_Customer_0420_EN_GLB.pdf\">Kaspersky\u2019s white paper, Time to switch \u2014 updating endpoint security: Why now is the time to act<\/a>, recommends you ask these questions.<\/p>\n<h2>1. What do independent test results say?<\/h2>\n<p>If another vendor is claiming their product is better than what you\u2019ve got, be sure to check whether their claims match up with what independent test labs find. These labs use cybersecurity experts to examine and evaluate features rigorously.<\/p>\n<p>Look at different labs\u2019 results carefully, because there are differences in the performance of different products. For example, <u><a href=\"https:\/\/www.av-test.org\/en\/\" target=\"_blank\" rel=\"noopener nofollow\">AV-Test<\/a><\/u> gave only one company\u2019s endpoint protection top marks in detecting <u><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/fileless-threats-protection\" target=\"_blank\" rel=\"noopener nofollow\">fileless attacks<\/a><\/u>. Look at the results of several tests and see which products consistently score near the top of the list.<\/p>\n<h2>2. Can your threat prevention cope with the most sophisticated attacks?<\/h2>\n<p>With threats becoming ever more sophisticated by the day, products designed a decade back may not be able to cope with them.<\/p>\n<blockquote><p>Fileless attacks are particularly tricky because they\u2019re designed to avoid triggering anti-intrusion protection. Blocking them would mean blocking legitimate software too.<\/p>\n<\/blockquote>\n<p>Endpoint protection that has a <u><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/behavior-based-protection\" target=\"_blank\" rel=\"noopener nofollow\">behavioral engine<\/a><\/u> does the job. A behavioral engine detects fileless threats at the execution stage by analyzing execution patterns, spotting the fileless attack among a myriad of legitimate processes. It then isolates the threat and restores user data. It also blocks vulnerabilities to prevent this happening in the first place.<\/p>\n<h2>3. Is it giving you enough management flexibility?<\/h2>\n<p>Older endpoint security technologies may not be designed for a heavily clouded IT sky. The cloud has led many companies to change how they do things, such as moving away from a centralized data center view of the world. They find it saves money and is more flexible. Security tools should be able to control new attack vectors that come with infrastructure change as well as the old ones.<\/p>\n<p>No company wants to get lost in a forest of different management tools. Your solution should handle it all \u2013 cloud and on-premise \u2013 equally well from a central console, also known as a \u2018single pane of glass.\u2019<\/p>\n<h2>4. Does it support remote work?<\/h2>\n<p>The lockdowns around the world that followed the COVID-19 pandemic showed employees must be able to work from home, among other places.<\/p>\n<p>Corporate networks need to be secure and resistant to attack from outside, but by definition, remote workers are outside that network. Existing software may not be able to handle it.<\/p>\n<p>For secure remote working, your endpoint protection platform must be able to secure endpoints remotely. This is especially challenging when employees are using older operating systems.<\/p>\n<h2>5. Got automation?<\/h2>\n<p>Reducing human interaction gives your organization a boost in controlling unwanted activity. This is particularly true when using cloud because allocating workload becomes more complex.<\/p>\n<p>There are modern security systems geared for this, often using artificial intelligence (AI.) AI-driven tools like <u><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/adaptive-anomaly-control\" target=\"_blank\" rel=\"noopener nofollow\">Adaptive Anomaly Control<\/a><\/u> bring automation to the task of sorting legitimate from nefarious activity, and constantly improves with machine learning. Businesses find these kinds of tools can significantly reduce staffing costs and related overheads.<\/p>\n<h2>6. Can it meet specialized needs?<\/h2>\n<p>On top of fileless attack protection, endpoint security most often comes unstuck on desktop firewall, ransomware protection and anti-exploit technology. As an example of why this matters, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-ransomware\/34227\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware is a growing threat<\/a> facing all organizations. To be effective, the software must protect not only impacted files, but also the disk to keep the master boot record intact.<\/p>\n<p>Look at your specific needs and see if your security vendor offers that level of protection.<\/p>\n<h2>7. Is there enhanced visibility with endpoint detection and response (EDR?)<\/h2>\n<p>You need to be able to act fast on threats. To be effective, threat blocking should be married with analyzing the root cause.<\/p>\n<p>EDR blocks threats and ensures attacks don\u2019t hit other parts of the corporate infrastructure. It lets you see into all endpoints, for protection and threat analysis. And no matter how complex the attack, security managers have a real-time view of the threat. All this means faster response to a security incident.<\/p>\n<h2>8. Does it have an effective sandbox for advanced threat protection?<\/h2>\n<p>Where threats are designed to bypass endpoint detection, sandboxes give an extra layer of security to automate detection and response. The sandbox isolates and detonates malicious applications, to analyze and detect even advanced exploits in targeted attacks. It can be costly, because it usually requires a cybersecurity specialist.<\/p>\n<p>Sandboxes are most effective when they\u2019re easy to install and operate, scalable and don\u2019t need specialist staff. Some endpoint products can\u2019t quickly identify and neutralize threats, for example, rules that detect and block similar <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/malware-trends-2019\/28098\/\" target=\"_blank\" rel=\"noopener nofollow\">malware attacks<\/a>. Security managers should consider whether their current product gives enough control. If not, there are others out there that do.<\/p>\n<h2>9. Does it have data protection with encryption management?<\/h2>\n<p>Integrated tools for data encryption come in two forms: Full-disk encryption (FDE,) preventing data leakage when a laptop is lost and file-level encryption (FLE,) protecting files when they\u2019re transferred in untrusted channels. You can also set policies that only certain users can see unencrypted files.<\/p>\n<blockquote><p>Alarm bells should ring when an endpoint protection product doesn\u2019t have effective encryption options. Laptops and other devices are often lost or stolen, so unencrypted files are a big risk.<\/p>\n<\/blockquote>\n<h2>10. Does it have vulnerability management and system hardening?<\/h2>\n<p>Many attacks happen through software vulnerabilities that could\u2019ve been patched. It seems basic, but not every endpoint solution can check your system for preparedness and strength. Effective patch management makes sure you find security vulnerabilities early and take pre-emptive measures. System hardening reduces the chance of an incident by intelligently disabling some higher risk features and applications.<\/p>\n<p>Companies are adjusting their IT infrastructure to support growth and respond to a changing world. Many will find their security products are no longer fit for a new business paradigm. It\u2019s time to look again at whether your current protection is enough.<\/p>\n<p>An effective endpoint security product should be able to meet all strains placed upon it. It will handle cloud and on-premises traffic with ease, all from a common platform. It will use automation to reduce the need for human intervention. The vendor should be able to back their claims with reputable lab tests.<\/p>\n<p>Even with updates, having an older endpoint security system may mean your business struggles against today\u2019s threats. Switching to an automated, comprehensive system, your company will be better able to cope with sophisticated attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Time\u2019s run out on endpoint security solutions that can\u2019t cope with today\u2019s threats and new ways of doing business. How will you know if yours is up to scratch?<\/p>\n","protected":false},"author":2600,"featured_media":35751,"template":"","coauthors":[3822],"class_list":{"0":"post-35743","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-endpoint-security","7":"emagazine-tag-cloud","8":"emagazine-tag-malware","9":"emagazine-tag-ransomware","10":"emagazine-tag-white-paper"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/switching_cybersecurity_questions\/35743\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/35743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35751"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35743"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=35743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}