Story image

Security: One size fits all? Or the glove that just won't fit right?

05 Jun 18

No two organisations are exactly alike. A one-size-fits-all approach just won’t work – and besides, doing what everyone else is doing is a sure way to continue following the crowd, rather than taking the lead.

With that in mind, some organisations still take the one-size-fits-all approach to their cybersecurity, instead of understanding what they need for effective endpoint security in their own business.

Cybersecurity firm SonicWall says that the threat landscape is escalating rapidly. In Q1 alone, its customers were protected from 7,739 malware attacks on average – many of which used encryption methods to hide activities.

Endpoints are truly the battleground of today’s threat landscape. End users are jumping on and off networks through their devices. Encrypted threats are reaching endpoint unchecked.

Your question may be, ‘how do I match endpoint security with my organisation?’

There are three weapons at your side: security management, analytics, and real-time threat intelligence. All of these have been integrated into SonicWall’s Capture Cloud Platform, which works to provide comprehensive protection.

“Today’s cyber threats are so agile and advanced that protecting customers on a by-the-minute basis is critical to delivering positive security outcomes,” comments SonicWall CTO John Gmuender.

SonicWall’s free executive brief presents four best-practice approach scenarios you can use to fit endpoint security to your organisation, no matter your size or industry.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.