With a strong history in the antivirus and antimalware space, McAfee is known for its legacy in endpoint protection. But given the shifts from signature-based threat detection to behavioral-based, the way that companies protect and defend their endpoint devices must change. Raja Patel of McAfee spoke with us to explain how McAfee has evolved its endpoint security strategy and highlight why he believes the endpoint device and the cloud are the two major control points of the future.
The security landscape is constantly changing and 2017 had some major sea changes for IT on the security front. We spoke with two experts from Carbon Black to get their take on what the notable security events in 2017 were, as well as their predictions for what IT workers should keep an eye out for in 2018 and beyond.
The next version of CDW Threat Check, a security assessment tool, will be rolling out to customers this spring. As new and aggressive security threats emerge regularly, organizations must be equipped with the right defenses. CDW Threat Check helps IT teams understand where their vulnerabilities and weaknesses may lie and offers up recommended solutions to the address the security gaps.
It might seem passé or unglamorous, but sweating the details when it comes to the finer points of your security policy can be just as important as the technical tools you implement to defend your corporate data. Furthermore, investments in training non-IT employees to detect and and avoid social engineering are also worth the time and effort as even the best IT solution can be circumvented by the human factor. We spoke with Mikela Lea of CDW to get her insights on policies, social engineering and password management in the modern age.
To keep up with the modern malware and threat landscape, organizations must turn to automation. In a world where bots can wreak havoc on endpoints and data centers, it might seem counterintuitive to reduce the human element in your threat prevention strategies, but Palo Alto Networks' Elton Fontaine argues it's essential since those IT workers can refocus their attention on proactive security instead of reactive security.