small align text-align-left refresh
Informational Series

What Is...?

Answer Your Endpoint Security Questions

text_image_eight full_width

What is Endpoint Security?

Securing endpoints in an organization used to be an afterthought. But with thousands of remote devices that access their most sensitive enterprise data, organizations are rethinking their approach to endpoint security.

Read More


What is Malware?

Because it is a rapidly evolving area of cybercrime, malware almost defies definition. Almost. However, just as fast as they are developed by attackers, security organizations are identifying new malware types and working diligently to prevent them.

Read More


What is Fileless Malware?

Fileless malware is a threat of many names – including non-malware, invisible malware, or in-memory, macro, and “living-off-the-land” attacks. But regardless of what it’s called, it is the next big attempt from cyberattackers to outsmart traditional security solutions and break through network perimeters. And it’s high on the list of threats to watch out for in 2018.

Read More


What is Ransomware?

Of all the types of malware out there, ransomware has been capturing most of the headlines lately because it’s become so pervasive, it’s almost epidemic. How to describe it best? Globally devastating and dangerous, simple to execute yet very financially lucrative, and digital extortion at its best.

Read More


What is Next-Generation Antivirus (NGAV)?

A hardcore reality in today’s information security world is that antivirus (AV) solutions just don’t work anymore. Attackers are too sophisticated and they are getting smarter and more devious every day. It’s time for a more intelligent approach.

Read More


What is Cyber Espionage?

Eventually, even the most timeless traditions make their way to the cyber world, and espionage is no different. Spies take the form of nefarious hackers from around the globe who use cyber warfare for economic, political, or military gain.

Read More


What is an Advanced Persistent Threat (APT)?

APTs take a different, more strategic and stealthy approach than malware. As they gain a foothold, they can achieve their goal over a period of months or even years.

Read More


What is Whitelisting?

While whitelisting is only one of many tools that provide complete and comprehensive endpoint security, it is often touted as a security essential and a significant contributor to blocking and preventing malicious attacks.

Read More


What is Behavioral Analysis?

Malicious attacks have one thing in common – they all behave differently than normal everyday behavior within a system or network. As attackers get more sophisticated, they continually develop new tactics, techniques, and procedures (TTPs). That’s where behavioral analysis comes in.

Read More


What is Big Data Analytics?

Next-generation endpoint security today is all about keeping pace and staying ahead of attackers. And one of the only ways to do so is through comprehensive insights that can only be derived from big data analytics.

Read More


basic_heading secondary align text-align-left color text-black refresh

Learn More About Carbon Black

latest-resource refresh