Made with FlowPaper - Flipbook Maker
Endpoint Security Edition Dec 2021www.grcoutlook.com THE DEDICATED CYBERSECURITY EXPERT Brian Bouchard, Co-Founder and CEO $20QUARANTINE UNINSTALL One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialRANTINE KILL PROCESS PATCH INVESTIGATE ALL REMEDIATE One Platform. One Agent. One View. The Qualys Cloud Platform and its powerful Cloud Agent provide organizations with a single IT, security and compliance solution – from prevention to detection to response! © 2021 Qualys, Inc. All rights reserved. Try it today for free qualys.com/free-trialCopyright @2021 GRC Outlook. All Rights Reserved. The content and images used in the publication should not be reproduced or transmitted in any form or by any means without the prior permission of Grc Outlook. Landon Noah Emily Ava Visualizers editor@grcoutlook.com Sophia Loren Joe TylerAnthony John Editorial staffs Copyright @ GRC Outlook 2021 The pandemic has made a significant transformation in the way businesses operate. It fueled the mass transition to remote working and learning to unprecedented changes. However, this transition made organizations more vulnerable to cyber security risks. According to various reports, cyber-attacks increased by over 400% as businesses entered the remote work culture. The modern endpoint security solutions combine intelligence integrations, continuous monitoring, and response capabilities that could detect and block attacks. It uses the public cloud to access the latest threat definitions and intelligence, delivering faster and more effective responses in case of an attack. Whatever the trends in cybersecurity and endpoint security are, the threats and risks to a business can be internal or external. Moreover, the remote work culture and decentralized work environments make it even more vulnerable to cyber- attacks. To thwart these challenges and to secure business, it’s vital to know potential endpoint security risks that might lead to network intrusion and data breaches. Security teams should also be aware of the trends and innovations around the cybersecurity landscape. To help businesses and CTOs be more vigilant and understand the endpoint security trends, we’ve made this special edition on Endpoint Security. This special edition features some of the solution providers who are on the frontline as well as innovative. We’ve also included insights from some of the well-known cybersecurity experts and veterans to help you learn more about the growing threats and challenges. We hope this edition adds value to your endpoint security initiatives. Secure the Ever-Expanding Attack Surface Natasha Jacob Managing Editor Sam Morris Sales sam@grcoutlook.com sales@grcoutlook.com EDITOR'S Letter Natasha Jacob Managing Editor Vishnu Santhosh Chief EditorAt Managecore, we know SAP ® . We create a relationship with our customers that is built on trust and deliver our services with full-transparency. Can your MSP say that? Discover a new way to manage your SAP landscape managecore.com | 844-999-3133 >> SAP Technical Managed Services >> MigrationServicesforSAPHANA ® , SAP S/4HANA ® , SAP BW/4HANA ® >> Cloud Migration Services32 31 26 WHY IS PHISHING AWARENESS TRAINING IMPORTANT? SHIFTING WORKPLACES, INCREASING VULNERABILITIES: 4 ESSENTIAL STEPS FOR ENDPOINT PROTECTION IN A COMPLEX WORLD HOME (WFH) WORLD ENDPOINT SECURITY INA WORK-FROM- HOME (WFH) WORLD Shawn Taylor, Senior Systems Engineer, Forescout Randy Marchany, Chief Information Security Officer, Virginia Tech Theo Zafirakos, CISO, Terranova Security FIGHT AI WITH AI: AUTOMATED SPEAR PHISHING ATTACKS POWERED BY ARTIFICIAL INTELLIGEN Joshua Crumbaugh, Chief Technology Officer, PhishFirewall PeopleSec Endpoint Security Redefined BITDEFENDER Ciprian Istrate, vice president, Bitdefender Consumer Solutions 17 Unparalleled End Point Security Solutions FIREEYE Bryan Palma, CEO 21 Diversity, Equity, and Inclusion PRESIDIO Bob Cagnazzi, President and CEO 27 CONTENT PAGE 18 THE CHALLENGE OF SECURING A TOMATO Kristin Manogue, Cloud Security Strategist, Check Point SoftwareCOVER STORY Page No 08 THE DEDICATED CYBERSECURITY EXPERT Brian Bouchard, Co-Founder and CEOBrian Bouchard, Co-Founder & CEOW ith all the work being done remotely today, there are more endpoints around businesses, leaving security at risk. Endpoints are easier to infiltrate, mostly because they lack the controlled security of the actual network itself. Under most circumstances, Endpoints are managed by the users, and in order for them to be completely secure, the operator has to make sure that all of the security measures are in place. Unless the endpoint users are tech-savvy, they’re likely not going to be implementing the same security measures as in a controlled office environment. Resolving such challenges is Alacrinet—a cybersecurity specialist. With modern endpoint management tools from Alacrinet, organizations and cybersecurity experts can identify vulnerabilities, detect and manage threats, apply patches, and maintain inventory from procurement to end of life. “We are a full-service cybersecurity consulting firm and utilize the analysts such as Forrester and Gartner to guide us in finding top-notch security solutions. Our team of in-house engineers are experts in endpoint security and know exactly how to implement and maintain your cybersecurity,” says Brian Bouchard, CEO, and Co-Founder of Alacrinet. THE DEDICATED CYBERSECURITY EXPERT COVER STORYNext >