Government agency IT organizations continue to grapple with how to best protect their networks from the inevitability of data breaches – which in many cases result from compromised endpoints. While most of the breaches that grab the headlines focus on consumer brands – such as Target, Apple, Facebook and Twitter – government agencies are constantly under attack and vulnerable to breach, reputation damage, and data theft despite the implementation of firewalls, antivirus software, and host-based intrusion prevention systems.
More than half of the respondents to a recent SANS 2014 survey indicate their networks have already been compromised or will be. They also noted that while most compromises are the result of unsophisticated, the ones that cause greatest damage are the result of unknown vulnerabilities and attack vectors. To combat these effectively, more endpoint intelligence is necessary.
A Guidance Software webinar, available for immediate viewing, offers a deeper dive into the SANS survey results examining the degree of endpoint visibility and the challenges and opportunities for developing the next-generation detection of and response to endpoint intrusions. Additionally, the webinar addresses the importance of developing specific strategies for detecting and remediating threats and augmenting endpoint visibility with tools that provide the capability to look at a broader set of endpoint assets.
What best practices are you employing to successfully thwart endpoint breaches? Share your thoughts in the comment section below.