Skip to the main content.

1 min read

The Adoption Of More Sophisticated Security Technologies

by Frank Leonarad
There are a number of new technologies emerging that may start to see wider adoption in 2018. For example, the use of “remote browsers” can be helpful for isolating a user’s browsing session from the network/endpoints.

Deception technologies, which work by imitating a company’s critical assets, act as a trap for attackers looking to steal this data.

There will also be an increase in the use of solutions which can detect and respond to anomalous behaviour. Firstly, there are Endpoint Detection and Response (EDR) solutions, which can monitor endpoints and alert sysadmins of suspicious behaviour. Secondly, Network Traffic Analysis (NTA) can be used to monitor network traffic to help determine the type, size, origin, destination and contents of data packets.

Thirdly, and very importantly, more and more companies are starting to adopt sophisticated real-time change auditing solutions, which can help companies secure critical assets in numerous ways. For example, they can help detect and respond to user privilege abuse and suspicious file/folder activity — either based on single event alert or threshold condition. They can detect account modifications, deletions, inactive user accounts, privileged mailbox access and a lot more.

IT Services Boston

IT Services Boston, MA Experts Share 13 Ways to Fight Ransomware

The Best Defense Against Ransomware is Our Managed IT Services Boston, MA Security Experts

If you run a business, you've heard of ransomware. It's...

Read More
IT Services Provider Boston

IT Services Provider Boston, MA Ransomware Survival Guide

How to Survive Ransomware

Even with new security measures, ransomware groups are constantly evolving to adapt to them and launching new ways to...

Read More
Managed IT Services Boston

Managed IT Services Provider Boston, MA Debunks 3 Ransomware Myths

Turn the Leading Provider of Managed IT Services in Boston for Ransomware Protection

In today’s digital age, ransomware attacks are becoming...

Read More