The Summit of Cybersecurity Sits Among the Clouds

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 17:38:33 +0000

Trend Micro Apex One™ as a Service You have heard it before, but it needs to be said again—threats are constantly evolving and getting sneakier, more malicious, and harder to find than ever before. It’s a hard job to stay one step ahead of the latest threats and scams organizations come across, but it’s something…

The post The Summit of Cybersecurity Sits Among the Clouds appeared first on .

Read more

3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response

Credit to Author: Trend Micro| Date: Mon, 18 Nov 2019 19:48:17 +0000

Endpoint protection is a critical component of a security strategy. But it’s not enough. Today’s threat landscape is so wide and varied, it requires round-the-clock monitoring, full visibility into IT environments and a multilayered approach to keep hackers at bay. For MSPs, this creates a sizable opportunity to protect clients with a comprehensive security strategy…

The post 3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response appeared first on .

Read more

XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Mon, 19 Aug 2019 13:22:58 +0000

Real enterprises are messy places. One messy reality is that enterprises don’t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network….

The post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on .

Read more

Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR

Credit to Author: Trend Micro| Date: Mon, 12 Aug 2019 15:17:00 +0000

A guest blog by Ian Loe, Senior Vice President, Cybersecurity, NTUC Enterprise Co-operative Limited News flash: aided by time, persistence and smarts, advanced cybersecurity felons are leapfrogging traditional security systems to compromise confidential data. Realising this, we at NTUC Enterprise have been looking into new security technologies that help address these rising concerns. One of…

The post Customer Perspective: Catching the thief lurking in the shadows with EDR and MDR appeared first on .

Read more

Why XDR Is A Big Deal, and Is Different from SIEM and Platforms

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Thu, 08 Aug 2019 14:30:36 +0000

In Jon Clay’s post, he does a great job of explaining the evolution from EDR to XDR. In short, he explained that Endpoint Detection and Response (EDR) is great, but that having sources of information beyond endpoint is better. The ‘X’ in XDR is essentially ‘many’ or whatever we can add to provide a broader,…

The post Why XDR Is A Big Deal, and Is Different from SIEM and Platforms appeared first on .

Read more