ENDPOINT PROTECTION
Endpoint security refers to the practice of protecting enterprise networks against threats originating from remote or local devices. An endpoint is any device that provides an entry point to enterprise assets and applications and represents a potential cybersecurity vulnerability. Examples include desktops, laptops, servers, workstations, smartphones and tablets.
-
EPP: ENDPOINT PROTECTION PLATFORM
<p style="text-align: justify;">This is the current name for traditional antivirus. It is a passive security solution designed to detect and block threats at the device level, it includes:</p> <p style="text-align: left;">?Antivirus.<br /> ?Antimalware.<br /> ?Intrusion prevention: IPS.<br /> ?Data loss prevention: DLP.<br /> ?Exploit prevention (only the most advanced ones).<br /> ?Anti-ransomware technology (most advanced).</p> <p style="text-align: justify;">Prevents attacks on endpoints from threats such as malware, zero-day vulnerabilities, and without files attacks. Detection is performed using various methods such as:</p> <p style="text-align: left;">?Searching known signature bases to detect file-based threats.<br /> ?Blocking/access to applications, URLs, ports, and addresses using blacklists or whitelists.<br /> ?Sandboxing to test for suspicious threats, such as executables.<br /> ?Behavioral analysis and machine learning to report suspicious activity.</p> -
EDR: ENDPOINT DETECTION AND RESPONSE
<p style="text-align: justify;">It is a tool that complements your existing technology and provides ways to detect (and even protect in some cases) malicious activity. In the event of a breach, it can provide robotic forensic findings and help investigate the attack. It offers:</p> <p style="text-align: left;">?Machine learning and analytics.<br /> ?Sandboxing.<br /> ?Alerts generated by external systems (IOC or indicators of compromise).<br /> ?Incident categorization to act on the most critical ones quickly.<br /> ?Incident investigation from a historical point of view: the origin and evolution of malware are traced to take preventive measures against future incidents.<br /> ?Remediation tools to remove infected files, quarantine them and revert to the pre-infection state.</p> <p style="text-align: justify;">Provides intelligence and visibility. Experienced personnel can filter out false positives and find actionable data to discover threats in advance.</p> -
DLP: DATA LOSS PREVENTION
<p style="text-align: justify;">Detects and prevents breaches, exfiltration, or unwanted destruction of confidential data. Organizations typically use it to:</p> <p style="text-align: left;">?Protect personal information and comply with relevant regulations.<br /> ?Protect Intellectual Property critical to the organization.<br /> ?Secure the mobile workforce in Bring Your Own Device environments.<br /> ?Achieve data visibility in large organizations.</p> -
BAS: BREACH AND ATTACK SIMULATION
<p style="text-align: justify;">Cymulate challenges security controls by performing thousands of attack simulations, quickly exposing security breaches, and providing corresponding mitigations, making security continuous, fast, and part of the daily business. ESPM (Extended Security Posture Management) is the evolution of BAS.</p> <p style="text-align: justify;"><a href="https://ciberwarfare.itsa.com.ar/en/cymulate-eng/">** Learn more about Cymulate **</a></p>









