End Point Security2018-03-02T17:35:35+00:00
Within the first hour, the antivirus products missed nearly of malware.
Average number of alerts per week an average enterprise receives.
IT budget spent on prevention controls that miss 796 malicious files per day.
The proportion of a survey of professionals who identified phishing and social engineering as top threats
  •  source:   http://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics-for-2017.htm
  • https://techbeacon.com/38-cybersecurity-stats-matter-most


Endpoint security refers to a methodology of protecting the corporate network devices, whether servers, computers, laptops, etc.  Remote access plays a big point in securing the endpoints. Each device connecting to the network creates a potential entry point for security threats.


Endpoint Security has experienced robust growth as organizations realize securing the perimeter is no longer enough.  There has been an explosion of new technology entering into this space. Some offer new ways to protect an organization from the proliferation of endpoint devices entering the workplace. We believe that your endpoint security solution should be tightly integrated with your other security tools. If your staff needs yet another screen to monitor and manage, it simply won’t get done.  We work with numerous vendors in this space and will work with you to recommend the best fit for your defense-in-depth security approach.


Image result for trend micro

There is no silver bullet

A Trend Micro technical white paper

The strengths and weakness of today’s threat-protection techniques—and why a multi-layered approach to endpoint security is a must.



  • CIS Controls

Latest Developments in the CIS Top 20

April 2, 2018|

Just when you feel you understand the CIS controls, a new version is released. In this case, the new version of CIS controls hopes to improve by separating them into three distinct categories and [...]

Today There Is A War – A Cyber War

December 1, 2017|

“At this time, the malware targets banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S.,”  https://threatpost.com/new-icedid-trojan-targets-us-banks/128851/ Cyber vulnerabilities and exploiting them are, more often than not, about money.  Cyber [...]

Contact us today for more information.

Contact Us

Hey before you leave. Subscribe to The Cyber Chronicle – Most popular news each week on cyber security.

Opt out at anytime.   No SPAM just great weekly content.

Click here to receive information about our free cyber security assessment.