PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Advanced endpoint protection takes on the latest exploits

This article is part of the Information Security magazine issue of July 2017
Scale is one measure of a security challenge. The AV-Test Institute registered 100 million-plus new malicious programs during a 12-month period ending in May 2017. Another way to gauge a security problem's severity is by its price tag. The average cost of a data breach rose from $3.8 million to $4 million in 2016, according to Ponemon Institute's "Cost of Data Breach Study." Grand View Research Inc. expects the endpoint security market to surge to a $27.05 billion valuation by 2024, up from $10.12 billion in 2015. In short, an endpoint infection that leads to a breach will have you paying at least twice. CISOs and directors who stay apprised of advanced endpoint protection developments can make informed decisions about where to invest in this market and provide input on its course of growth. Endpoint security is making strides in behavior analytics, sandboxing and machine learning, increasing its capacity to mitigate advanced malware. These developments play a significant role in defending the enterprise against evolving threats...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Advanced endpoint protection takes on the latest exploits
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints.
-
Mobile security strategy matures with BYOD
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy.
Columns in this issue
-
Do thoughts of your least secure endpoint keep you up at night?
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies.