News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Webinar 02.07.21: Endpoint Detection and Response (EDR)
Kaspersky_news

Kaspersky shows how Endpoint Detection and Response - EDR for short - can protect a company. The free webinar starts on Friday, July 02.07.21nd, 10st at 11 a.m. and should last until around 10 a.m. As part of his new series of webinars, companies can find out first-hand everything that is new and worth knowing about Kaspersky products and solutions on the first Friday of each month from 11 a.m. to 02.07.21 a.m. Kaspersky EDR webinar on July 02nd, 2021st It starts on July 10nd, XNUMX at XNUMX a.m. with Endpoint Detection and Response (EDR) - the hot topic on the market. And that from ...

Read more

Baramundi UEM with antivirus management
baramundi uem 2021

Baramundi UEM now with integrated antivirus management. Baramundi Software AG publishes the new 2021 R1 release of the baramundi Management Suite (bMS) in June. The comprehensive Unified Endpoint Management (UEM) received numerous improvements and extensions. There is now a central administration of the Microsoft Defender Antivirus, new profiles for the staggered rollout of Microsoft updates, a display of historical data in the monitoring of Argus Cockpit, a mobile version of the baramundi Management Center, a ticketing system and numerous other detailed improvements. As in the previous versions, the 2021 R1 ...

Read more

AV-Comparatives: Colonial attack could have been prevented
B2B Cyber ​​Security ShortNews

The colonial ransomware attack could have been prevented by using an enterprise security solution and the right patch management. So Peter Stelzhammer, co-founder of AV-Comparatives. AV-Comparatives recently published the results of its Enterprise Endpoint Protection (EPP) Main-Test Series. The factsheet contains the results of the Enterprise Malware Protection Test and the Enterprise Real-World Protection Test. 19 Endpoint protection solutions put to the test Using one of these enterprise security solutions and the right patch management could have easily prevented the ransomware attack on the Colonial Pipeline. The use of security solutions is almost always ...

Read more

Test: Android security apps for companies
AV TEST News

The laboratory experts at AV-TEST have examined security apps for endpoint security solutions. The protective effect (protection), the speed (performance) and the usability (usability) were evaluated. Employees should also protect their private cell phones - there is also a current security app test for this. In March and April 2021, the AV-TEST Institute conducted realistic tests to test security apps for endpoint security solutions. The companies ESET, Sophos and Symantec are also in the test. The laboratory has also published the test values ​​from Google Play Protect for comparison. Because Play Protect runs automatically on every current Android smartphone and examines installed and new apps….

Read more

Award for ESET Endpoint Security for Android
Eset_News

European IT security manufacturer receives award for consistently top results of its mobile business solutions. The test laboratory AV-Test honors ESET for outstanding test results in 2020. For the ninth time in a row, the AV-TEST Institute has presented its award for the best IT security products. ESET receives the 2020 award in the Android Security for Enterprise test category for ESET Endpoint Security. The security solution from the European IT security manufacturer impressed with consistently outstanding performance throughout 2020, proven in extensive tests over the period. Android endpoint protection for business "With the 'Endpoint Security' solution, ESET sets new standards in the protection...

Read more

Intercept X protects Snapdragon computing platforms
Intercept X protects Snapdragon computing platforms

Sophos Intercept X keeps Qualcomm's Snapdragon computing platforms safe. Next generation cybersecurity for PCs with 5G technology. Sophos today announced its plans to provide Intercept X endpoint protection for 5G PCs based on Qualcomm® Snapdragon ™ computing platforms from Qualcomm Technologies Inc. The combination of Sophos Intercept X with Snapdragon computing platforms offers users a next-generation security environment in a PC environment that is active around the clock and always connected to the Internet. Sophos Intercept X for Snapdragon Compute Platforms is expected to be available in the second half of 2021….

Read more

Misconfigurations invite cyber criminals
Misconfigurations invite cyber criminals

Misconfigurations open the door to the network for cyber criminals. A risk analysis of all endpoints can help to sharpen the focus on these weak points. Armed with this information, IT security can proceed to eliminate the risks. The threat landscape is serious and organizations are facing more attacks from cyber criminals. These are also becoming more and more dangerous and sophisticated because the attackers are constantly using new attack vectors or more advanced technologies such as machine learning. At the same time, the attack surface through cloud computing and the workforce distributed in the home office is constantly increasing and is more difficult to keep track of. No wonder,…

Read more

Conti ransomware attack in the live report
Conti ransomware in a live report

Five days in close contact with Conti ransomware: Sophos describes in three reports in detail the procedure of a real Conti ransomware attack and how it was stopped. Also included: attack behavior, technical background and practical tips for IT administrators. Conti ransomware attacks, which have been wreaking havoc since the middle of last year, are an impressive example of how cybercriminals use modern and sophisticated technology to plan their attacks in a targeted manner and thus greatly improve their chances of successfully penetrating company networks. In three detailed reports, the Sophos Rapid Response team describes a real attack and the course over five days: "This was a very fast ...

Read more

AV-TEST: new test procedures for ATP attacks
AV TEST News

Strategic attacks require new test procedures: this is part of the new test concept published by AV-Test, the independent antivirus test laboratory based in Magdeburg. As the threat level increases, companies are increasingly expanding their IT security through specialized defense mechanisms to ward off strategic and targeted attacks. At the same time, further strategies to avert danger are being developed. But how good is the defense performance of new products in the area of ​​endpoint protection and endpoint detection & response against APT attacks? The AV-TEST Institute gives an insight into new test procedures for the professional assessment of such solutions. New danger situations require new test structures On the homepage you will find ...

Read more

Case study: IT refurbisher uses ESET
Eset_News

Companies like to recommend their solutions in theory. In the following case study, an IT refurbisher uses the cyber security solution from ESET and shows how he protects his processes in everyday life. The market for processed IT hardware is booming. So-called refurbishers like bb-net media GmbH buy discarded devices, bring them up to date with the latest technology and sell them on. Comprehensive IT security guarantees a smooth transition to the second life cycle. Managing Director Michael Bleicher sees this as an ongoing process that has to be constantly reconsidered and revised. This includes, for example, the data protection compliant ...

Read more