May 8, 2017 By Mitch Mayne 2 min read

I recently had the chance to sit down with Paul Ferrillo and Chis Veltsos, authors of the book, “Take Back Control of Your Cyber Security Now.” In the interview, they both talked about recent high-profile malware attacks making news in the press. In most cases, the cybercriminals got in through insecure endpoints.

Take Back Control of Your Endpoint Security

Endpoint attacks made headlines throughout 2016, and if the past few months are any indication, 2017 isn’t shaping up to be all that different. Endpoints continue to be the favored unlocked window through which cybercriminals can climb, and companies struggle to secure an ever-shifting and virtually undefinable security perimeter.

IBM BigFix Detect can help keep endpoints more secure, according to CBI Cyber Security Solutions. In fact, it cited a number of new features that can help organizations not only see what’s happening across the entire endpoint landscape, but also take immediate action to stop threats before they wreak havoc across the network.

The Benefits of BigFix Detect

The CBI article offered an in-depth look at the changes BigFix Detect brings to securing endpoints, and the author didn’t mince words when discussing the benefits:

  • “I now have real-time visibility into things that happen on my managed devices in a way that I never had before. How many times have you heard of an end user reporting that malware is running on the machine? Have you ever wondered what all was really happening on the machine? Have you ever wanted to know in real time that bad things are happening?”
  • “I not only know what is happening on the machine, I also have a level one security analyst looking through the data for me automatically, telling me what I need to know about and what is going on in ways that are easy to understand.”
  • “Not only do I have the ability to see where something bad is happening within a couple of seconds, I can see all systems in my environment that are experiencing the same thing.”
  • “Then I can remediate within a few clicks.”

Learn More

Find out more about how BigFix Detect can give you the endpoint visibility you need, along with intelligent analysis, so you can remediate issues quickly by attending an upcoming BigFix Proof of Technology event.

Read the White paper: Go beyond attack detection to transform endpoint security

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today