Director at a tech services company with 1-10 employees
Reseller
2020-05-18T15:23:14Z
May 18, 2020
Cylance:
One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine, California and
with offices around the world, Cylance was founded by a team of security industry professionals and scientists with the goal to “redefine the endpoint standard of protection by preventing threats from ever executing.”
Bottom Line: Cylance’s signatureless anti-malware provides an alternative to traditional, signature-based technology, and benefits from easy deployment and management, low-performance impact, and high detection rates against new threat variants. The company is a good pick for companies of all sizes looking to shore-up existing defenses, or for an alternative to traditional anti-malware. The most valuable feature is the ability to respond to zero-day and unknown threats.
Cylance’s AI and Machine Learning ensures that all types of malware and PUP (Potential Unwanted Programs) are detected and your endpoint devices are fully protected, even with day zero threats.
Search for a product comparison in Endpoint Protection Platform (EPP)
Senior Consultant at a tech services company with 11-50 employees
Real User
2020-05-19T17:03:10Z
May 19, 2020
Some words about ransomware first.
Ransomware has become much more targeted these days, so that ordinary users are less likely to suffer from it.
Also, avoid the free tools as with the degree of sophistication and the way they target companies, most of them will not remove the ransomware.
Finally, also think about protecting mobile devices as these now has email clients, VPN tools and access to corporate applications. Therefore, go for those protecting mobile phones also.
I have seen many interesting products proposed in this forum. Adding the following 3:
1. Bitdefender
2. AVG Antivirus paid version
3. Trend Micro Antivirus RandomBuster
This application addresses the ransomware issue through a bait mechanism - fake files are placed in pre-selected strategic locations around a system and are then observed for any malicious behaviors or attack attempts.
In 2020, the most significant ransomware threats is still “WannaCry.” WannaCry is a type of malicious software (malware) that encrypts files on a targeted computer and demands money from its victims in exchange for ransom. It was first identified in May 2017 when it infected more than 230,000 computers across 150 countries within one day.
In October 2019, security researchers at Avira reported that WannaCry had already compromised over 1 million computers worldwide since its release two years earlier. This number suggests that the virus continues to be an ongoing and very real threat to businesses and individuals across the globe - even three years later.
The biggest cause of worry with WannaCry is how well it spreads itself quickly across networks - both inside organizations as well as via external providers like banks or other third-party service companies they may use. To make matters worse, this type of ransomware has been combined with other forms of malware or viruses such as Emotet and Trickbot to create highly potent cybercriminal toolkits capable of taking down entire systems without any user interaction necessary; all it takes is just a single click on an infected file sent by phishing email for everything else to unfold eventually leading up to ransom requests for payment in cryptocurrency such Bitcoin or Etherium in order for full access back into their own systems again post-infection.
Furthermore, due to its wide distribution capability via multiple attack vectors such as unpatched remote desktop protocol servers (RDPs), malvertising campaigns on social media platforms (such Facebook or Twitter), malwares hidden within seemingly innocent attachments like images/documents etc., more recent variants have become much harder to detect even after putting preventive measures like antivirus solutions into place against them. All these factors contribute heavily towards why WannaCry remains one of the biggest threats not only this year but also possibly going forward beyond 2020 too if proper steps are not taken soon enough by enterprise organizations around the world who haven’t upgraded their security posture yet
The SentinelOne Endpoint Protection Platform (EPP) unifies prevention, detection, and response in a single purpose-built agent, powered by machine learning and automation. It is not reliant on hash signatures or an internet connection. SentinelOne provides prevention and detection of attacks across all major vectors and rapid elimination of threats with a fully automated real-time response without human intervention.
SentinelOne can also detect and protect against zero-day, file less and lateral movement attacks.
SentinelOne has not been breached and offers upto $1,000,000 warranty if it cannot roll back a ransomware attack.
Please contact me at cybersec@global.co.za for more information, a demonstration, or a quote.
OK a real tricky answer. There are so many out there now and all seem to have one or the other upper hand on the ransomware arena. It all depends on their back end system finally - How they analyse and how fast they analyse (even if in the wild) . And most importantly how fast u can get tech support - Try out Crowdstrike, Checkpoint, Sophos, McAfee, TrendMicro. Remember this - you need to be more specific with your actual physical scenario to get a better answer. This one is very generic in purpose.
Cortex XDR de Palo Alto Networks is the best solution in the market, because it has protection methods multiples, like are Local Machine Learning/IA, Static Analysis, Dynamic Analysis, Network Profiling, Baremetal, Exploits Protection (By technical or method, no by exploit), Kernel Protection, Behavior Anomaly Protection, etc. Best score in the Mitre att&ck Evaluation.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP). Updated: November 2024.
IT Security Architect at a computer software company with 51-200 employees
User
2020-05-18T21:50:39Z
May 18, 2020
There are several good ones and it depends on budget, integrations needed, staff levels, etc. Crowdstrike Falcon is great if you can afford it. Price reflects "set it and forget it" type of EPP. No need to hire FTE to manage it and comes with 24x7x365 SOC. If you can manage, SentinelOne offers great detections and incident response capabilities (it is really an EDR). S1 has a ransomware rollback feature in case it gets through initial detections (can restore encrypted files if needed) and provides up to 1 million in ransom costs to back up their confidence. If you are a Checkpoint shop and want to leverage some of their other features (Cloudguard SaaS, Endpoint Encryption, etc.) then their Sandblast agent also offers great detections and a rollback feature of their own. Palo Alto traps is decent if you are a PAN shop but can get heavy on admin overhead. Same with Cisco AMP. We do not sell traditional A/V anymore because of polymorphic threats and zero day. Must have behavioral analytics and anomaly detection capabilities.
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
Cylance:
One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine, California and
with offices around the world, Cylance was founded by a team of security industry professionals and scientists with the goal to “redefine the endpoint standard of protection by preventing threats from ever executing.”
Bottom Line: Cylance’s signatureless anti-malware provides an alternative to traditional, signature-based technology, and benefits from easy deployment and management, low-performance impact, and high detection rates against new threat variants. The company is a good pick for companies of all sizes looking to shore-up existing defenses, or for an alternative to traditional anti-malware. The most valuable feature is the ability to respond to zero-day and unknown threats.
Cylance’s AI and Machine Learning ensures that all types of malware and PUP (Potential Unwanted Programs) are detected and your endpoint devices are fully protected, even with day zero threats.
Some words about ransomware first.
Ransomware has become much more targeted these days, so that ordinary users are less likely to suffer from it.
Also, avoid the free tools as with the degree of sophistication and the way they target companies, most of them will not remove the ransomware.
Finally, also think about protecting mobile devices as these now has email clients, VPN tools and access to corporate applications. Therefore, go for those protecting mobile phones also.
I have seen many interesting products proposed in this forum. Adding the following 3:
1. Bitdefender
2. AVG Antivirus paid version
3. Trend Micro Antivirus RandomBuster
This application addresses the ransomware issue through a bait mechanism - fake files are placed in pre-selected strategic locations around a system and are then observed for any malicious behaviors or attack attempts.
In 2020, the most significant ransomware threats is still “WannaCry.” WannaCry is a type of malicious software (malware) that encrypts files on a targeted computer and demands money from its victims in exchange for ransom. It was first identified in May 2017 when it infected more than 230,000 computers across 150 countries within one day.
In October 2019, security researchers at Avira reported that WannaCry had already compromised over 1 million computers worldwide since its release two years earlier. This number suggests that the virus continues to be an ongoing and very real threat to businesses and individuals across the globe - even three years later.
The biggest cause of worry with WannaCry is how well it spreads itself quickly across networks - both inside organizations as well as via external providers like banks or other third-party service companies they may use. To make matters worse, this type of ransomware has been combined with other forms of malware or viruses such as Emotet and Trickbot to create highly potent cybercriminal toolkits capable of taking down entire systems without any user interaction necessary; all it takes is just a single click on an infected file sent by phishing email for everything else to unfold eventually leading up to ransom requests for payment in cryptocurrency such Bitcoin or Etherium in order for full access back into their own systems again post-infection.
Furthermore, due to its wide distribution capability via multiple attack vectors such as unpatched remote desktop protocol servers (RDPs), malvertising campaigns on social media platforms (such Facebook or Twitter), malwares hidden within seemingly innocent attachments like images/documents etc., more recent variants have become much harder to detect even after putting preventive measures like antivirus solutions into place against them. All these factors contribute heavily towards why WannaCry remains one of the biggest threats not only this year but also possibly going forward beyond 2020 too if proper steps are not taken soon enough by enterprise organizations around the world who haven’t upgraded their security posture yet
SentinelOne is my recommended solution.
The SentinelOne Endpoint Protection Platform (EPP) unifies prevention, detection, and response in a single purpose-built agent, powered by machine learning and automation. It is not reliant on hash signatures or an internet connection. SentinelOne provides prevention and detection of attacks across all major vectors and rapid elimination of threats with a fully automated real-time response without human intervention.
SentinelOne can also detect and protect against zero-day, file less and lateral movement attacks.
SentinelOne has not been breached and offers upto $1,000,000 warranty if it cannot roll back a ransomware attack.
Please contact me at cybersec@global.co.za for more information, a demonstration, or a quote.
OK a real tricky answer. There are so many out there now and all seem to have one or the other upper hand on the ransomware arena. It all depends on their back end system finally - How they analyse and how fast they analyse (even if in the wild) . And most importantly how fast u can get tech support - Try out Crowdstrike, Checkpoint, Sophos, McAfee, TrendMicro. Remember this - you need to be more specific with your actual physical scenario to get a better answer. This one is very generic in purpose.
Cortex XDR de Palo Alto Networks is the best solution in the market, because it has protection methods multiples, like are Local Machine Learning/IA, Static Analysis, Dynamic Analysis, Network Profiling, Baremetal, Exploits Protection (By technical or method, no by exploit), Kernel Protection, Behavior Anomaly Protection, etc. Best score in the Mitre att&ck Evaluation.
There are several good ones and it depends on budget, integrations needed, staff levels, etc. Crowdstrike Falcon is great if you can afford it. Price reflects "set it and forget it" type of EPP. No need to hire FTE to manage it and comes with 24x7x365 SOC. If you can manage, SentinelOne offers great detections and incident response capabilities (it is really an EDR). S1 has a ransomware rollback feature in case it gets through initial detections (can restore encrypted files if needed) and provides up to 1 million in ransom costs to back up their confidence. If you are a Checkpoint shop and want to leverage some of their other features (Cloudguard SaaS, Endpoint Encryption, etc.) then their Sandblast agent also offers great detections and a rollback feature of their own. Palo Alto traps is decent if you are a PAN shop but can get heavy on admin overhead. Same with Cisco AMP. We do not sell traditional A/V anymore because of polymorphic threats and zero day. Must have behavioral analytics and anomaly detection capabilities.