endpoint security

Your endpoint will usualy be your attackers first target

XDR

Extended detection and response (XDR) is a category of tools and technology used for protecting computer hardware devices called endpoints from potential threats.
XDR platforms are made from tools that focus on detecting possible malicious endpoint activities, commonly through employing continuous monitoring.

Top Vendors

XDR

Deception

Deception technology is a cybersecurity defence practice that aims to deceive attackers by distributing a collection of traps and decoys across a system’s infrastructure to imitate genuine assets. If an intruder triggers a decoy, then the server will log and monitor the attack vectors utilized throughout the duration of the engagement

Top Vendors

MTD

Mobile threat defence (MTD) is sophisticated, dynamic protection against cyber threats targeted against mobile devices. With MTD, protection is applied to devices, networks, and applications.

Top Vendors

App Control

Application control is a security technology that recognizes only safelisted or “good files” and blocks blocklisted or “bad files” passing through any endpoint in an enterprise network. It is useful for securing networks with BYOD (Bring Your Own Device) policies as it prevents potential damage from unwanted or unknown applications (executables, DLLs, Windows App store apps, device drivers, control panels, and other Portable Executable (PE) files).

Top Vendors

Skip to content