Shut Down Endpoint Threats DON’T LET PERIMETER ATTACKS GET THROUGH TO YOUR CORPORATE NETWORK

GENERAL BEST PRACTICES

JK Lialias, director of product solutions at McAfee, offers up a few best practices when trying to shore up any potential endpoint security weaknesses:


• Implement a security framework that scales and adapts to a changing threat landscape.

• Ensure that detection and response capabilities form a core part of the overall endpoint defense
DNA. Don’t simply bolt it on; make sure it integrates well into the overall endpoint protection
technologies and, more importantly, the rest of your security environment.

• Deploy technologies that have been proven or built on sound technology to avoid the false
positives. Be mindful of how the next silver bullet is going to function, make sure that
technologies are integrated and collaborate with each other.

• Share threat intelligence in real-time and quickly apply learnings.

• Signature-less protection is essential, especially when dealing with zero-day threats. Machine
learning-based technologies are great as many leverages

the cloud for additional speed and
effectiveness.

• Automate where possible.

• Consolidate agents for more seamless, less contextual changes, and management of the endpoint environment.

• Eliminate manual process to help stay ahead of advanced threats and become more strategic
in terms of approaching endpoint security challenges.