Security News
If a compromise is not contained within the endpoint, it can rapidly spread to other endpoints and across the network. Segmentation firm Illumio is closing this gap with the release of Illumio Edge - segmentation for the endpoint.
Absolute announced new platform capabilities enabling customers to strengthen sensitive data and endpoint device protections in remote or hybrid work environments. Enhancements allow IT and Security teams to gain a richer understanding of their endpoint device environments; more quickly and effectively assess data or device risk; and take swift action to freeze or erase data on dark endpoints, even without physical device access.
Various factors such as growing e-commerce industry, increasing number of IoT devices, emergence of disruptive digital technologies across the industry verticals, and increasing demand for endpoint security are expected to boost the demand for endpoint security solutions and services across the globe. In order to protect endpoint devices and information from security breaches and cyber -attacks, the implementation of endpoint security solutions is increasing across various business verticals, which is ultimately driving the growth of endpoint security.
Today, Siemens and industrial AI-firm, SparkCognition, announced a new cybersecurity solution for industrial control system endpoints. According to a joint study conducted by the Ponemon Institute and Siemens that surveyed global energy industry executives, 67% of respondents said industrial control systems are more at risk today from cyberattack than ever before.
These centred on the apparent difficulty in provisioning Intel AMT to endpoint devices and the management of some use cases such as remote wake-up and remote KVM. Such difficulties might easily arise when attempting to activate Intel AMT on new machines that may have been delivered to remote branch offices with no IT staff on-site, for example, or to workers that are connecting to the corporate network from outside the firewall. To address these issues, Intel has extended the Intel vPro® platform with a new software service known as Intel® Endpoint Management Assistant, which builds on and modernises the capabilities of Intel® AMT. Intel® EMA has been designed as a cloud-based point of control for managing endpoint devices wherever they may be, inside and outside the corporate firewall.
Qualys has added malware detection to its cloud-based Remote Endpoint Protection offer, which is free for 60 days. Powered by the Qualys Platform and Cloud Agent, malware detection in Remote Endpoint Protection uses file reputation and threat classification to detect known malicious files on endpoints, servers, and cloud workloads.
Automox, the cloud-native endpoint hardening platform provider, announced it will offer its automated endpoint hardening platform at discounted cost to 2020 presidential and congressional campaigns in partnership with Defending Digital Campaigns. Through the partnership, Automox is offering its cloud-native cyber hygiene platform to political campaigns to provide access to holistic endpoint hardening that automates the enforcement of critical patches, software updates, security configurations and more.
Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced the groundbreaking Adaptiva OneSite Intune Edition. This new product makes Adaptiva the first and only third-party software delivery system for Microsoft Intune, enabling Intune to scale to hundreds of thousands of endpoints per enterprise.
Quest Software, a global systems management, data protection and security software provider, announced new feature updates for several of its KACE solution offerings. KACE, a solution-set available from the Quest Unified Endpoint Management business, empower organizations to take control of their network-connected devices and automate endpoint management tasks to ensure license compliance and a secure network.
To help plug it, Citrix Systems has launched App Protection, which enables companies to protect apps and data on unmanaged endpoints and ensure their corporate systems and information remain safe. "Endpoints are the penultimate control point for the implementation of device, application, and data security. The rapid acceleration of remote work sparked by the COVID-19 pandemic and proliferation of unmanaged personal devices being used for business has created a special challenge, as decentralization is not the friend of security," said Frank Dickson, Program Vice President, Security & Trust, IDC. "And specialized and sophisticated tools are required to overcome it."