Posts tagged with "EDR"



Demystifying Cybersecurity: Zero Trust Architecture in a Nutshell
Blog | Endpoint Protection · 08. May 2023
Nowadays most employees are provided with the ability to work remotely and access their work data and services from virtually any location, on any device, and at any time. While this may be an improvement in terms of offering employees more of a work-life balance, employees still have one *little* thing to worry about: SECURITY. Easier access to more services from more devices and locations translates into an exponentially increased surface of attack, so a comprehensive security strategy must...

2022: The Year in Review & Looking Forward to 2023
13. December 2022
Coming out of 2021, a year that was spent entirely in a global pandemic, 2022 was expected to be the year of rebuilding and returning to “normalcy” in some way. However, 2022 saw the outbreak of a war between Russia and Ukraine in addition to households across the world being directly impacted by inflation and recession. As a result, many were forced to do “more with less” to cope with these struggles. This applies to organizations, which have had to work around inflation while still...

State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Blog | Expert's view · 09. March 2022
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...

Cyber Security Solutions
Blog | Endpoint Protection · 01. March 2022
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.

Solution Highlight: VMware Carbon Black
Blog | Endpoint Protection · 14. September 2021
In our recent blog post, we talked about behavior-based security, a whole new approach to tackling today’s security challenges by preventing an attack before it even happens.

A better approach to cybersecurity
21. June 2021
Which Comes First: EPP, EDR or XDR? Recently there have been a few industry reports that have shed light – perhaps a confusing light – on BlackBerry’s cybersecurity vision. Rest assured, we are not wavering in our beliefs or slowed in our production. In fact, we’ve doubled the size of our portfolio in the last few months alone. We’ve released a new generation (the seventh) of our Cylance® AI engine math model (although our five-year-old model prevented Darkside just fine).

Cyber Security Digital Summit
16. November 2020
More and more organizations are enabling mobile productivity in the workplace, remote workers are becoming increasingly exposed to new cyber risks. Lookout and Cyber Security Hub organize the first cybersecurity summit dedicated to mobile security on December 2, 2020 - the Cyber Security Digital Summit.

Cyber Security Digital Summit
05. November 2020
As organizations are enabling mobile productivity in the workplace, remote workers are becoming increasingly exposed to new cyber risks. Lookout and Cyber Security Hub joined forces to organize the first cybersecurity summit dedicated to mobile security on December 2, 2020. ISEC7 will take part with an own partner booth!

30. October 2020
Comprehensive Endpoint Detection and Response Solution Purpose-built for Mobile Today’s cyber-attackers utilise sophisticated methods over many days or weeks to execute a data breach. Not all of these attacks involve malware or exploits, and your customers must adapt to a new kind of threat to keep their sensitive data safe.