I recently had the chance to sit down with Paul Ferrillo and Chis Veltsos, authors of the book, “Take Back Control of Your Cyber Security Now.” In the interview, they both talked about recent high-profile malware attacks making news in the press. In most cases, the cybercriminals got in through insecure endpoints.

Take Back Control of Your Endpoint Security

Endpoint attacks made headlines throughout 2016, and if the past few months are any indication, 2017 isn’t shaping up to be all that different. Endpoints continue to be the favored unlocked window through which cybercriminals can climb, and companies struggle to secure an ever-shifting and virtually undefinable security perimeter.

IBM BigFix Detect can help keep endpoints more secure, according to CBI Cyber Security Solutions. In fact, it cited a number of new features that can help organizations not only see what’s happening across the entire endpoint landscape, but also take immediate action to stop threats before they wreak havoc across the network.

The Benefits of BigFix Detect

The CBI article offered an in-depth look at the changes BigFix Detect brings to securing endpoints, and the author didn’t mince words when discussing the benefits:

  • “I now have real-time visibility into things that happen on my managed devices in a way that I never had before. How many times have you heard of an end user reporting that malware is running on the machine? Have you ever wondered what all was really happening on the machine? Have you ever wanted to know in real time that bad things are happening?”
  • “I not only know what is happening on the machine, I also have a level one security analyst looking through the data for me automatically, telling me what I need to know about and what is going on in ways that are easy to understand.”
  • “Not only do I have the ability to see where something bad is happening within a couple of seconds, I can see all systems in my environment that are experiencing the same thing.”
  • “Then I can remediate within a few clicks.”

Learn More

Find out more about how BigFix Detect can give you the endpoint visibility you need, along with intelligent analysis, so you can remediate issues quickly by attending an upcoming BigFix Proof of Technology event.

Read the White paper: Go beyond attack detection to transform endpoint security

More from

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Why Operational Technology Security Cannot Be Avoided

Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite occupying a critical role in a large number of essential industries, OT security is also uniquely vulnerable to attack. From power grids to nuclear plants, attacks on OT systems have caused devastating work interruptions and physical damage in industries across the globe. In fact, cyberattacks with OT targets have substantially…

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…