Excerpts from Moving Endpoint Security to the Predictive Cloud: Choosing the Right Cloud

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Carbon Black recently published a whitepaper on the reasons and benefits of moving endpoint security to the cloud; this is the first excerpt from that guide, which you can find here. For more information about how the Cb Predictive Security Cloud, Carbon Black’s comprehensive endpoint protection platform, delivers next-generation security services through the cloud, check out our weekly Cb Defense Live Demo, every Wednesday at 2PM EST, 11AM PST.


Choosing the Right Cloud

In an attempt to take advantage of the clear benefits that come with cloud computing, many traditional endpoint security vendors have begun offering cloud versions of their solutions. However, not all security clouds are built the same.

In fact, most cloud-based antivirus options available today are retrofit solutions that have simply migrated their on premises products to vendor-managed servers. Under the covers, they still operate with the same outdated technologies that only protect against malware threats after they have been discovered. Customers are left with weak protection in a rapidly accelerating threat landscape.

On the other hand, a cloud built on bi-directional communication with endpoints, where endpoint data is sent to a cloud-based big data and realtime analytics engine, transforms the endpoint environment into a global threat monitoring system. The cloud is predictive, able to discover threats never seen before and provide protection from sophisticated attacks to every endpoint under management.

When evaluating your next endpoint security solution, the following table will help you determine if the cloud solution you are looking at will deliver on the full promise of cloud computing for security.

 

     
 

Traditional AV
(Retrofit Cloud)

Next-Gen Endpoint Security
(Big Data Cloud)

             

Threat Detection

 

Malware Only
Focuses on executable-based threats.

 

 

Malware and Fileless
Detects executable-based threats as well as advanced attacks that don’t use malware.

 

             

Endpoint Communications

 

Broadcast
“Black-box” threat information is broadcast one-way to endpoints, with no data collected from them.

 

 

Bi-directional
Threat data is exchanged back and forth between endpoints and the cloud, creating a global threat monitoring system.

 

             

Data Collection

 

None
Endpoint data is not sent to the cloud, leaving users with no context about security events.

 

 

Unfiltered
Endpoint telemetry is sent to the cloud, providing a complete contextual picture for investigation against them.

 

             

Security Posture

 

Reactive
Protects against known threats and limited attack behaviors.

 

 

Predictive
Discovers new threats never seen before and protects against them.

 

             

Updates

 

Manual and Delayed
The customer is responsible for applying updates, keeping policies configured correctly, and deploying new defense techniques when they are available.

 

 

Automatic and Real-Time
Every endpoint benefits from new defense techniques and algorithms deployed natively in the cloud, along with easy, lightweight agent updates.

 

             

______________________________________________

 

Listen to our security experts at Carbon Black and Network Security Engineer Christopher St. Amand at PeoplesBank during a recent webinar where we discussed the benefits of cloud-based security platforms and how they apply to your specific needs.

Watch Now

______________________________________________

 

Thanks for joining us as we explored “Moving Endpoint Security to the Predictive Cloud,” our whitepaper on the reasons and benefits of moving endpoint security to the cloud. You can click here to get a copy of the full report. Join us next week as we continue to profile this report.

The post Excerpts from Moving Endpoint Security to the Predictive Cloud: Choosing the Right Cloud appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
68 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 7 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel