Over the years, cybersecurity vendors have created a storm of complexity to defend devices and put the burden on one load-bearing support beam – the administrator.  The expansion of devices, operating systems, attack surfaces, and forms of attack have spawned a storm system on our devices:  a tsunami of clients, tornado of management consoles, and ...
Read Blog
A new SANS 2018 Survey on Endpoint Protection and Response, co-sponsored by McAfee, reports that the top threats to organizations include web-based malware, social engineering and ransomware—all of which focus on user endpoints. So what does that mean when you are trying to protect an ever-changing attack surface?  The survey results point to three best ...
Read Blog
It’s the security weaknesses you don’t know about or the next zero-day threat that keeps most of us up at night. That’s why when it comes to testing for effectiveness against threats, it’s critical to look at how a defense works to combat current, real world samples. After all, you need to know how your ...
Read Blog
Everywhere you turn today, machine learning and artificial intelligence are being hyped as both a menace to and the savior of the human race. This is perhaps especially true in cybersecurity. What these alluring terms usually mean is simply related to detailed statistical comparisons derived from massive data collections. Let’s look at the terms themselves: ...
Read Blog
When you think of Endpoint Detection and Response (EDR) tools, do you envision a CSI-style crime lab with dozens of monitors and people with eagle eye views of what their users and defenses are doing? For many, the idea of EDR seems like something for “the big players” with teams of highly trained people. This ...
Read Blog
The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research,  has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a score of 17.5 out of ...
Read Blog
When you’re managing a large environment with thousands of endpoints, assuring consistency can be a huge challenge. Imagine that you want every endpoint to be upgraded to a specific software version, for example. In many cases, you’re forced to rely on manual tracking, where errors and omissions are commonplace. And, if you want to demonstrate ...
Read Blog