Story image

Security: One size fits all? Or the glove that just won't fit right?

05 Jun 2018

No two organisations are exactly alike. A one-size-fits-all approach just won’t work – and besides, doing what everyone else is doing is a sure way to continue following the crowd, rather than taking the lead.

With that in mind, some organisations still take the one-size-fits-all approach to their cybersecurity, instead of understanding what they need for effective endpoint security in their own business.

Cybersecurity firm SonicWall says that the threat landscape is escalating rapidly. In Q1 alone, its customers were protected from 7,739 malware attacks on average – many of which used encryption methods to hide activities.

Endpoints are truly the battleground of today’s threat landscape. End users are jumping on and off networks through their devices. Encrypted threats are reaching endpoint unchecked.

Your question may be, ‘how do I match endpoint security with my organisation?’

There are three weapons at your side: security management, analytics, and real-time threat intelligence. All of these have been integrated into SonicWall’s Capture Cloud Platform, which works to provide comprehensive protection.

“Today’s cyber threats are so agile and advanced that protecting customers on a by-the-minute basis is critical to delivering positive security outcomes,” comments SonicWall CTO John Gmuender.

SonicWall’s free executive brief presents four best-practice approach scenarios you can use to fit endpoint security to your organisation, no matter your size or industry.

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Red Box gains compliance boost with new partnership
By partnering with Global Relay, voice platform provider Red Box is improving the security of its offerings for high-value and risk voice data.