News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Endpoint security for office PCs with Windows 10
AV TEST News

They are still found in large numbers in companies: Office PCs with Windows 10. In its Windows test series, the AV-TEST Institute has now examined 17 endpoint solutions to see how well they ward off malware, how much strain they place on the systems and whether they produce many false alarms. Many of the products are top according to the test results. In November and December 2024, the AV-TEST Institute tested a total of 17 security solutions for companies and 15 for individual workstations under Windows 10. All products were examined in the areas of protection, system load and user-friendliness. Each solution can achieve a maximum of 18 points in a test. In the table...

Read more

Endpoint: Enterprise solutions tested against ransomware
AV TEST News

The AV-TEST Institute examined 8 security solutions for companies in an extended test. The focus was not on the mass detection of malware, but on real defense in 10 scenarios against ransomware and infostealers. The results. 8 products for companies were subjected to the Advanced Threat Protection test at AV-TEST: Bitdefender (with 2 versions), ESET, Kaspersky (with 2 versions), Microworld, Qualys and Trellix. The data was collected and evaluated in September and October 2024 under Windows 11. 12 protection solutions tested under Windows 11 In 10 real scenarios, the experts from…

Read more

Test: Protection against malware under MacOS Sonoma 14.6
AV TEST News

Hundreds of particularly dangerous MacOS malware attack corporate protection products under Sonoma 14.6 in a laboratory test. The Q3/2024 test shows strong solutions for Macs in companies. The laboratory tested the security solutions for companies in the areas of protection, system load and usability. No easy undertaking, as the malware samples in the test are the particularly dangerous spearhead of current threats. With a few exceptions, the tested products secured top scores, which noticeably increases the security of MacOS systems. Increasing threat situation for Macs The constantly increasing threat situation in IT security does not only affect Windows, Linux systems or the cloud. The…

Read more

New proactive IT security adapts to attack surfaces 
New proactive IT security adapts to attack surfaces Image: Bing - AI

Bitdefender today introduced its new GravityZone Proactive Hardening and Attack Surface Reduction (PHASR). GravityZone PHASR analyzes individual user behavior, such as the use of applications or privileges for accessing resources, and clusters users into groups with similar behavior patterns. With this solution, Bitdefender offers the industry's first dynamic solution that directly aligns cyber defense strategies with user behavior. This novel approach ensures that IT security policies and controls are precisely tailored to the user privileges and behaviors that an IT security manager wants to give users. As soon as the...

Read more

Test: Endpoint security for MacOS systems
AV TEST News

The laboratory of the independent AV-TEST Institute examined 3 endpoint solutions for MacOS systems and 7 single-user versions. The results are consistently very good and did a good job of warding off the dangers in the test. In June 2024, the AV-TEST Institute tested a total of 3 endpoint solutions for MacOS systems and 7 single-user versions. The products were examined in the areas of protection, system load (performance) and user-friendliness (usability). Top scores for endpoint solutions The laboratory awarded up to 6 points for each area. The best score was therefore 18 points. All three endpoint solutions examined achieved this top score. Bitdefender Endpoint Security…

Read more

Test: 17 protection solutions for Windows 11 clients
B2B Cyber ​​Security ShortNews

Global competition, espionage and global tensions are leading to a rising tide of cyberattacks. The AV-TEST laboratory has investigated how well endpoint security solutions protect. 17 solutions were tested under Windows 11. Companies must be well equipped in the area of ​​cybersecurity in order to filter and eliminate the large amounts of digital malware from their communications. The test of 17 protection solutions for Windows 11 clients for companies shows how well they are defending themselves against potential attackers. 17 endpoint solutions tested In March and April, the experts in the AV-TEST laboratory…

Read more

Advanced Unified Endpoint Management (UEM) solution
Advanced Unified Endpoint Management (UEM) solution - Image by svetjekolem on Pixabay

The Unified Endpoint Management (UEM) solution from baramundi has received numerous enhancements. These include password management options, secure connections through Per-App VPN and further development for recording end user feedback in Argus Experience. With this release, Argus Experience now has the functionality to record end user feedback directly. In addition to other new device data, IT admins also have the option of continuously requesting direct feedback from employees about their IT environment. This provides a holistic view of the managed work environments and IT admins can proactively and specifically identify and resolve potential incidents before a ticket is opened. Per-App VPN…

Read more

Cybersecurity platform with protection for 5G environments
Cybersecurity platform with protection for 5G environments AI- Bing

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting enterprises' ever-expanding attack surface, including securing 5G deployments. In the coming years, private 5G networks will cover a wide range of facilities, from corporate campuses to smart factories to shopping malls. However, they also pose new risks arising from complex network function virtualization (NFV), challenges in information technology and operational technology (IT/OT) convergence, unprotected IoT devices, and new implementations of 5G communications technology (CT). Covering Expanded Attack Surfaces Such a large attack surface requires holistic security across IT, OT and CT environments to manage...

Read more

Ransomware attacks: via remote device into the network
Ransomware attacks: via remote device into the network - AI

Successful ransomware groups are increasingly switching to remote encryption, according to Sophos' latest CryptoGuard report. The problem: traditional anti-ransomware protection does not “see” the disaster coming and is ineffective. The type of attack has increased by 62 percent. Sophos has published its new report “CryptoGuard: An Asymmetric Approach to the Ransomware Battle” with the evaluations of its CryptoGuard defense technology. The most successful and active ransomware groups such as Akira, ALPHV/BlackCat, LockBit, Royal or Black Basta are consciously switching to remote encryption for their attacks. With this so-called “remote ransomware”, cybercriminals use a compromised and often poorly protected device to steal data on other…

Read more

Integrated Cloud Risk Management and XDR 
Integrated Cloud Risk Management and XDR

Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments. Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP,…

Read more