Posts tagged with "Mobile Threat Defense"



Demystifying Cybersecurity: Zero Trust Architecture in a Nutshell
Blog | Endpoint Protection · 08. May 2023
Nowadays most employees are provided with the ability to work remotely and access their work data and services from virtually any location, on any device, and at any time. While this may be an improvement in terms of offering employees more of a work-life balance, employees still have one *little* thing to worry about: SECURITY. Easier access to more services from more devices and locations translates into an exponentially increased surface of attack, so a comprehensive security strategy must...

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Demystifying Security: Threat Detection, Prevention, and Response (EPP, EDR, and MTD)
Blog | Endpoint Protection · 05. April 2022
In a previous article, we covered Mobile Threat Defense (MTD) solutions, offering threat detection, prevention, and response on mobile devices. Today we will cover similar functions but in more traditional desktop devices like workstations, laptops, and servers. Although the goal is similar, due to its own idiosyncrasies, the response is delivered in a different manner, with two different solutions providing a combined response: Endpoint Protection Platform (EPP) and Endpoint detection and...

2020 Threat Hunting Report
23. October 2020
Falcon OverWatch (TM) is the CrowdStrike® managed threat hunting service built on the CrowdStrike Falcon® platform. OverWatch provides deep and continuous human analysis on a 24/7 basis to relentlessly hunt for anomalous or novel attacker tradecraft designed to evade other detection techniques.

Accountability in your digital workspace
06. October 2020
As we wrap up our blog series on 7 things you can do to improve your mobility ecosystem, we would like to leave you with this final thought: the success of your digital workspace is predicated on the effort from across your entire team – from the front-line resources in their daily leveraging of the mobility solution, to your back office team consuming the data generated throughout the business and contributing to its agility. At the end of the day, the singular goal for the organization is...

ISEC7 SPHERE
29. September 2020
As we saw in our previous article about Multi-Factor Authentication (MFA), one of the key parts of security is ensuring the identity of the users accessing your corporate resources. This can be combined with other well-known technologies like Single Sign-On (SSO) to make that process not only as secured as possible but also as simple and transparent for the end-users, so they are not tempted to use easy and weak credentials.  But identity is just one piece, considering that once identified,...

ISEC7 SPHERE
25. August 2020
What is Multi-Factor Authentication?  Multi-Factor Authentication (MFA) is an authentication method in which a user is required to present two or more pieces of evidence (also known as factors) to authenticate. Factors include:  Knowledge: Something the user and only the user knows (ex: credentials like password and PIN)  Possession: Something the user and only the user has (ex: mobile device, token, credit card CVV)  Inherence: Something the user and only the user is (ex: fingerprint,...

ISEC7 SPHERE
14. August 2020
Every organization now has tablets and smartphones regularly connecting to their data. For many IT administrators, the default way to handle those devices is to deploy a Mobile Device Management (MDM) solution – which makes sense. After all, you should have an inventory of your devices and be able to manage them. But what about when one of your employees receives a malicious phishing link on their mobile device or they accidentally install a malicious app? To complete your mobile strategy and...

ISEC7 SPHERE
13. August 2020
Twitter recently experienced one of its most notable breaches. On July 15, an unauthorized party entered its backend infrastructure and gained access to 130 accounts belonging to high-profile individuals such as Barack Obama, Kanye West, Bill Gates and Elon Musk. The attackers stole more than $100,000 by tweeting out Bitcoin phishing scams and snatched data from some of the handles.

ISEC7 SPHERE
04. August 2020
What is MTD?  Yet another three-letter acronym in the increasingly complex mobility world?  Well, not exactly. MTD stands for Mobile Threat Defense and, to make a long story short, this is comparable to the typical antivirus software installed on your desktop computers but extended to a whole new level to tackle the challenges brought on by our ever-connected mobile devices.