Blog

  • From
  • to

Next Generation Endpoint Security, Part 5: Remediation and Rollback

Picture this: your endpoint protection system has identified a virus, either by detecting its signature or identifying its behavior. It has mitigated the virus and stopped the bleeding, either by halting the responsible executable, dropping the infected endpoint off the network, or even shutting it down entirely. This is all…

August 24, 2016

Sarah Vanier

Hiding in plain sight?

While looking for interesting malicious files, sometimes it’s best to just listen to the source it comes from. Are they telling you it’s going to be malware? Maybe it is, or maybe it’s misdirection. That was the starting point for taking a look at this Linux based “malware”, just the…

August 23, 2016

Tim Strazzere

What is “Bulletproof Hosting” and Why Should You Worry?

For business leaders who understand the real challenges of today's online world, it's no surprise that there are large global networks that can provide havens for hackers and cybercriminals. However, it's hard for many top career professionals to recognize these cybercriminal safe houses amid the flurry of websites they likely…

August 22, 2016

Scott Gainey

Why Do Companies Need a Next Generation Endpoint Antivirus Solution?

It wasn’t too long ago that an antivirus program was considered the standard in terms of network security – pros and home users alike installed these vendor options (often out of the box) onto systems to keep Trojans, worms and other viruses from destroying systems and deleting important data. But…

August 19, 2016

Sean Roth

What’s Wrong with the Enterprise Antivirus Industry?

Imagine buying a product that didn’t live up to its claims, or worse, one that caused serious damage. No one would make such a purchase intentionally. Yet, companies around the world buy a software product that not only doesn’t do what it says it will do, it could actually make…

August 17, 2016

Sarah Vanier

The Current State of Cyber Security for Financial Services (Spoiler: It’s Still Not Great)

Do you remember the problems that plagued cyber security for financial services in 2014? The high volume of attacks on globally-recognized financial institutions led the industry to be named the world’s most vulnerable to cyber attacks that year. The industry-wide vulnerability to cyber attacks led many of the world’s largest…

August 15, 2016

Scott Gainey

Critical Features of Next-Generation Endpoint Security, Part Four: Mitigation

It's not enough to see the malware that's coming for you—you have to be able to stop it. For Next Generation Endpoint Security solutions, that statement is doubly true. As stated in one of our previous blogs on the subject, SentinelOne relies on a behavioral detection engine in order to…

August 12, 2016

Sean Roth

The Most Devastating Cyber Attacks on Banks

For cybercriminals, banks represent a high risk/reward proposition. Banks tend to have a great deal of investment in cyber-protection—more so following a few of the most recent attacks discussed in this article—but on the other hand, the information they contain is easily converted into cash. Some of the information literally…

August 10, 2016

Sarah Vanier

What is Endpoint Security Software?

Information security is a topic that often resists understanding by laymen. That's on us, as an industry—too often, the explanation of what we do and why it's important devolves into a stew of acronyms, assembly code, and other bits of poorly-explained jargon. So, here we are to answer one of…

August 08, 2016

Scott Gainey

NetTraveler Malware Returns from Obscurity—What You Need to Know About the Threat

Over 390,000 new malware variants are discovered each day, according to the independent IT security institute AV-Test. The persistent growth of the cyber threat landscape shouldn’t surprise anyone at this point. What you may not know, though, is that more than 90% of these “new” pieces of malware are actually…

August 05, 2016

Scott Gainey

1 2 3 9