6 Criteria Used to Evaluate an Endpoint Security Product

Published on 02/24/15 04:03PM

OEM Business, Endpoint Security

Whether you are an industry veteran or a new company that is looking to foster repeat business and loyal customers, delivering a managed endpoint security product can be a good revenue opportunity for you.

Preventing corporate devices from being compromised is a daily struggle. A staggering 220,000 new malware samples are stealing corporate information, taking financial data, blackmailing companies, ransoming corporate data, and creating malicious behavior. You may be a managed service provider (MSP, MSSP), a web security gateway company, IT managed services, or a company that provides products and services to the SMB and enterprises. Businesses that offer endpoint security solutions to their clients want strong products and services to grow revenue, increase profit, and expand into new markets. This article examines different criteria that these businesses should consider before selecting an endpoint security product.

Read More

POS Security (1): Lessons for Every Business Employing Such Systems

Published on 02/12/15 04:00PM

Threats, Network Security, Endpoint Security

POS security is one term that we’ve been hearing for more than five years now. And its dark connotations only increased in intensity with the recent Target and Home Depot breaches that shook the two retailers to their core. But it’s not only high-profile retailers that should be wary of such attacks. Smaller companies – retail chains, restaurants and other types of business – in the US, Canada, Australia and Russia have had their POS systems breached in recent months.

So regardless of industry or location, if you have a POS system in place, or you’re considering employing one, you may become a target. To prevent this gloomy perspective, it’s recommended you fully understand how POS systems work, what types there are and the risks they present, as well as the basic security questions you need to ask a potential POS vendor when evaluating their solution.

Read More

Data Breaches of 2014: From Retail to Healthcare No Industry Is Spared

Published on 01/23/15 03:00PM

Threats, Network Security, Endpoint Security

2014 will most likely go down in history as the year of major data breaches. Notable companies across various industries had their systems hacked, causing a wake of incalculable damage to their brand and customer loyalty.  Some had their customers’ and employees’ personal data compromised, while others had assets exposed to theft and misuse.

According to press reports, the most targeted sector was retail –  Home Depot, Target, Neiman Marcus and Michael’s are just a few examples of hacked high-profile retailers. Despite major investments in security, the banking/financial sector was also highly affected by data breaches – the JPMorgan Chase and Korea Credit Bureau  hacks are just two cases that made headlines. In contrast, the healthcare sector lags behind in terms of security investments, wide-spread good practices and dedicated IT staff. And the Community Health Services hack showed once again how vulnerable the healthcare industry is to medical data theft. 

Read More

Top OEM Predictions for 2015: Security Becomes Smarter

Published on 01/16/15 03:52PM

OEM Business, Network Security, Endpoint Security, Technology, Internet of Things

Technologies are evolving at a faster pace than ever before. They’re becoming smarter, quicker, wiser. The evolution of the Internet of Things (IoT) and Bring Your Own Device (BYOD) over the past couple of years is a clear sign that we’re becoming more connected with each other, with our homes and offices. And that connectivity becomes seamless, uninterrupted, as more sophisticated wearable devices enable us to stay connected while out and about. But greater connectivity comes with greater security risks. Cybercriminals have shown time and time again how skilled they are at exploiting a variety of interconnected systems and networks. So what about security – how will it evolve with all these welcome-but-risky developments?

Read More

Botnet Anonymization: How to Deal with Anonymous Zombies

Published on 12/30/14 04:00PM

Threats, Network Security, Endpoint Security

Gartner recently announced its predictions on the number of interconnected devices that will make up the Internet of Things (IoT) in the following years: 25 billion connected devices by 2020. This is a clear sign that technological advancements are moving quickly to make our lives easier. Before we get excited, we should take a look at what this means for the dark side of the IoT: internet-connected devices will also make it easier for bot-masters to seize and control thousands, it if not hundreds of thousands, of “zombies”.

Read More

Detecting Advanced Persistent Threats: Myths & Realities

Published on 12/02/14 11:07AM

Threats, Network Security, Endpoint Security, Technology

Advanced Persistent Threats (APTs) have been a hot topic for quite some time. In the hype created around it, the media and security specialists have ventured to provide opinions and explanations on various aspects, including what an APT is, and how to protect against it. For example, security vendors offering solutions against APTs often claim that “Traditional signature-based security won't protect you from APTs”. They also explain that they offer “a signature-less, virtualized detection engine", and other modern technologies that protect against APTs. But are they really 100% effective?

And are all these claims valid?

Read More

Holiday Shopping Blues: Customer Trust in POS Security Slumps. What to Do?

Published on 11/27/14 10:30AM

Threats, Network Security, Endpoint Security

Typically, ‘tis the season for joyous shopping. But after the latest POS Security breaches suffered by major retailers such as Target and Home Depot, customers seem to suffer from holiday shopping blues: their trust in credit card payments has dropped, and they’re reluctant to return to stores that have been hacked. According to a recent survey by Princeton Survey Research Associates International for CreditCards.com, 45% of respondents owning a credit or debit card would definitely or probably avoid shopping at one of their regular stores if that retailer had experienced a data breach. Also, only one in eight respondents are still likely to shop with credit cards this holiday season.

Read More

Smart Homes Controlled by Smartphones Need 3x Smarter Security

Published on 10/09/14 04:21PM

OEM Business, Mobile Security, Network Security, Endpoint Security

Oh, what’s in a home, if not comfort and safety? But what if you could enhance these attributes? Just imagine getting comfortable in your bed and suddenly realizing you forgot to lock your front door. What if, instead of actually going downstairs to lock it, you could just stay in bed and press a “lock door” button on your smartphone? You could do that – if you had a smart home automation system in place.

Although it’s still in its infancy, this niche market is creating a lot of hype in the tech world. There are mobile apps available for both Android and iOS which can control just about every device or functionality in your home. And there are actual home automation systems you can install and create a home network of interconnected devices and appliances that you can control through your smartphone. According to research company HIS Technology, by 2018 there will be 45 million smart home devices used as part of home automation systems around the world.

Controlling all of your smart appliances through your smart phone sounds so convenient, doesn’t it? But what about security?

Read More