This document highlights the elements that organizations should consider when looking for EDR tools & services.
This paper addresses the phases of the incident response process and some common pitfalls of their implementation. It also introduces the concept of a layered approach to cybersecurity and incident response including Endpoint Detection, Malware Hunting, and Deep Memory Forensics and their roles in every phase of the incident response process.
Download the exclusive “2016 State of Endpoint Report,” conducted by Ponemon Institute. This highly anticipated report is one of the most influential studies covering the next-generation endpoint security landscape.
Watch our recorded webinar as Dr. Larry Ponemon discusses the results from the “2016 State of Endpoint Report,” conducted by Ponemon Institute. This highly anticipated report is one of the most influential studies covering the next-generation endpoint security landscape.
This report reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.
CounterTack, a leader in the advanced endpoint security space, has announced that it has been included in the list of "Cool Vendors" in the 2014 Cool Vendors in Application and Endpoint Security report by Gartner, Inc. Every year, Gartner selects new Cool Vendors in critical technology areas and publishes a series of reports emphasizing the products and services that make these vendors significant. According to Gartner in the 2014 report, “Endpoint protection is becoming more sophisticated and targeted at common problem areas of security.”
Join CounterTack and featured speakers from Clone Systems, GoSecure and SAVANTURE for a roundtable discussion around next-generation MSSP models, leveraging today’s most advanced security solutions to provide their customers with extensive coverage on their entire infrastructure. During this webinar we will discuss a variety of topics including: Best-of-breed approaches used by current MSSP’s, The need for SMB’s to consider their threat exposure on the endpoint, How best to deploy continuous monitoring and incident response technology through trusted MSSP's, Overall best practices for effectively leveraging an MSSP