Search This Blog

Friday, December 2, 2016

How To Evaluate a Next- generation Endpoint Protection

We are lately seeing blogs attempting to publicly demonstrate that next-generation protection solutions, like Adaptive Defense, are vulnerable. These proofs of concept aim to demonstrate that there are malicious files that evade detection when reaching a system or attempting to run. The problem with these demonstrations is that the writer expects the malicious files to be stopped before being run. But that’s a mistake, and reveals a clear misunderstanding of this new protection model based on the continuous monitoring of process activities.



How To Evaluate a Next- generation Endpoint Protection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.