Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Transparency and Visibility: Foundations of Secure by Design
    • Beyond Modernization
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Transparency and Visibility: Foundations of Secure by Design
    • Beyond Modernization
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Endpoint Data Key to Thwarting Security Breaches

by GTI Editors
May 21, 2014
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

Government agency IT organizations continue to grapple with how to best protect their networks from the inevitability of data breaches – which in many cases  result from compromised endpoints. While most of the breaches that grab the headlines focus on consumer brands – such as Target, Apple, Facebook and Twitter – government agencies are constantly under attack and vulnerable to breach, reputation damage, and data theft despite the implementation of firewalls, antivirus software, and host-based intrusion prevention systems.

More than half of the respondents to a recent SANS 2014 survey indicate their networks have already been compromised or will be. They also noted that while most compromises are the result of unsophisticated, the ones that cause greatest damage are the result of unknown vulnerabilities and attack vectors.  To combat these effectively, more endpoint intelligence is necessary.

A Guidance Software webinar, available for immediate viewing, offers a deeper dive into the SANS survey results examining the degree of endpoint visibility and the challenges and opportunities for developing the next-generation detection of and response to endpoint intrusions. Additionally, the webinar addresses the importance of developing specific strategies for detecting and remediating threats and augmenting endpoint visibility with tools that provide the capability to look at a broader set of endpoint assets.

What best practices are you employing to successfully thwart endpoint breaches?  Share your thoughts in the comment section below.

Tags: data breachEndpoint Intelligenceendpoint securityGuidance Softwareprotecting endpointsSANSSANS 2014 survey results

RELATED POSTS

Cost of a Data Breach
Civilian

With the Cost of a Data Breach on the Rise, Does the Federal Government Need Cyber Insurance?

October 29, 2021
IoT Devices
Security

As IoT Devices Put Government Agencies at Risk, Securing Endpoints Has Never Been More Important

March 11, 2021
iot
COVID-19

With More IoT Devices in Use, Cyberattacks are on the Rise

September 3, 2020
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    13002 shares
    Share 5201 Tweet 3251
  • Next-Generation Military Training: Army and Marine Corps at Forefront of Change with 5G and Live, Virtual Constructive (LVC) Modules

    19 shares
    Share 8 Tweet 5
  • Private Networks: The DoD’s Gateway to Commercial 5G

    68 shares
    Share 27 Tweet 17
  • CJADC2 – Enabling the Department of Defense to ‘Sense, Make Sense, and Act’

    12 shares
    Share 5 Tweet 3
  • How SD-WAN is Updating Legacy Network Technology for the Intelligence Community

    15 shares
    Share 6 Tweet 4

CONNECT WITH US

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us