Most of today’s security is still stuck in the world of reactive. Solutions still look for known attacks, but are almost defenseless against unknown malware or exploits. However, new, Next-Generation Endpoint Protection technologies take a new approach, looking at the system behavior to identify suspicious activity. This paper identifies the six key features to look for when assessing Next Generation Endpoint Protection technologies.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond