The endpoints are considered computers, servers, laptops, tablets, mobile phones and other devices used by employees of the enterprise. All of them can be infected through the network, USB drives, and become a source of the spread of threats across the enterprise network. Modern endpoint protection products must evolve faster than adversaries and block threats before they even penetrate the protected system. In addition, they should be able to counteract targeted attacks (0-day attack).
- Sandbox
Sandbox is an isolated environment for launching programs in order to search for errors or vulnerabilities and prevent their further distribution.
The sandbox allows you to protect critical network systems by emulating the working environment with a dedicated set of resources and launching a suspicious program or code in it.
As a testing environment, virtual spaces or dedicated servers are usually used.... - Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR) is a new security category defined by Gartner in 2013. It refers to protection of endpoints, such as such as a personal computers, or servers, helping security teams gain visibility into malicious activity on an endpoint, and remotely control endpoints to contain and mitigate attacks. Detection mechanism helps detect attacks on endpoint devices and provide security teams with fast access to information that can help investigate the attack. Response actions can automatically response to attacks by performing actions at the device level, such as quarantining the endpoint or blocking malicious processes....