small align text-align-left refresh
Informational Series

What Is...?

Answer Your Endpoint Security Questions

text_image_eight full_width

What is Endpoint Security?

Securing endpoints in an organization used to be an afterthought. But with thousands of remote devices that access their most sensitive enterprise data, organizations are rethinking their approach to endpoint security.

Read More


What is Malware?

Because it is a rapidly evolving area of cybercrime, malware almost defies definition. Almost. However, just as fast as they are developed by attackers, security organizations are identifying new malware types and working diligently to prevent them.

Read More


What is Fileless Malware?

Fileless malware is a threat of many names – including non-malware, invisible malware, or in-memory, macro, and “living-off-the-land” attacks. But regardless of what it’s called, it is the next big attempt from cyberattackers to outsmart traditional security solutions and break through network perimeters. And it’s high on the list of threats to watch out for in 2018.

Read More


What is Ransomware?

Of all the types of malware out there, ransomware has been capturing most of the headlines lately because it’s become so pervasive, it’s almost epidemic. How to describe it best? Globally devastating and dangerous, simple to execute yet very financially lucrative, and digital extortion at its best.

Read More


What is Next-Generation Antivirus (NGAV)?

A hardcore reality in today’s information security world is that antivirus (AV) solutions just don’t work anymore. Attackers are too sophisticated and they are getting smarter and more devious every day. It’s time for a more intelligent approach.

Read More


What is Cyber Espionage?

Eventually, even the most timeless traditions make their way to the cyber world, and espionage is no different. Spies take the form of nefarious hackers from around the globe who use cyber warfare for economic, political, or military gain.

Read More


What is an Advanced Persistent Threat (APT)?

APTs take a different, more strategic and stealthy approach than malware. As they gain a foothold, they can achieve their goal over a period of months or even years.

Read More


What is Whitelisting?

While whitelisting is only one of many tools that provide complete and comprehensive endpoint security, it is often touted as a security essential and a significant contributor to blocking and preventing malicious attacks.

Read More


What is Behavioral Analysis?

Malicious attacks have one thing in common – they all behave differently than normal everyday behavior within a system or network. As attackers get more sophisticated, they continually develop new tactics, techniques, and procedures (TTPs). That’s where behavioral analysis comes in.

Read More


What is Big Data Analytics?

Next-generation endpoint security today is all about keeping pace and staying ahead of attackers. And one of the only ways to do so is through comprehensive insights that can only be derived from big data analytics.

Read More


What is the Cloud?

In the context of next-generation endpoint security, this can mean allowing companies to take advantage of unfiltered data, predictive analytics, machine learning, and behavioral analytics to secure their endpoints from all types of attacks and malicious activities.

Read More


What is Incident Response?

On average, it takes 214 days to identify a malicious or criminal attack, and 77 days to contain and recover. It’s clear that better incident response management is needed to fully protect organizations from the growing and accelerating number of threats they face every day.

Read More


What is Cyber Threat Hunting?

Threat hunting is an aggressive tactic that works from the premise of “assumption of breach;” that attackers are already inside an organization’s network and are covertly monitoring and moving throughout it.For companies that are ready to take on a more proactive approach to cyber security – one that attempts to stop attacks before they get too deep – adding threat hunting to their security program is the next logical step.

Read More


What is SecOps?

As information security teams become more important in organizations, there is often a distinct gap that arises between them and IT operations teams. Each has fundamentally different priorities, which can result in conflicting efforts and disparate tools that create inefficiencies, reduce security postures, and open up an organization to greater risks.

Read More


What is Endpoint Detection and Response?

Endpoint detection and response, or EDR, solutions provide a different capability to the security stack. With EDR in place, security teams can continuously collect, record, and store endpoint data, providing them with surveillance-like visibility they can use to investigate a past incident or to proactively hunt for threats in their environment.

Read More


basic_heading secondary align text-align-left color text-black refresh

Learn More About Carbon Black