PREDI C TI VE I NTEL L I GE NC E
How automated
defence tools are
helping to protect
the endpoint
A robust endpoint security strategy is critical for
modern CISOs who are facing more threats than ever.
Tamer Odeh, Regional Sales Director for SentinelOne, tells
us about some of the biggest threats to the endpoint and how
the security company is helping to combat these.
H
How would you describe the
overall threat landscape?
The threat landscape on the whole is
persistently growing, which shouldn’t
surprise anyone at this point.
With more than 90% of these ‘new’
pieces of malware being just modified
versions of existing threats (even the
latest zero-day attacks include elements
of old attack vectors), even within
the past year, the number of different
types of ransomware discovered by
security researchers around the world
has doubled – the sophistication and
maliciousness of threats has intensified.
Emerging trends, such as the recent
BlueKeep exploit or Magecart, means
that security teams are working harder
than ever before to keep up in the
evolving threatscape.
www.intelligentciso.com
|
Issue 20
What are some of the biggest
challenges CISOs are dealing
with when it comes to
endpoint security?
Every CISO knows that finding skilled
security staff these days is not only hard
but getting increasingly harder.
The number of organisations reporting a
cybersecurity skills shortage has risen
every year from 42% in 2015 to 53% last
year. We just don’t have the staff to fill
the gaps in this industry.
As the demand across the industry
grows, there’s no shortage of people
talking about the problem either,
with increasing demands for more
cooperation between universities, private
organisations and government to boost
training opportunities and encourage
more diverse applicants into the field.
Specifically, in the endpoint security
field, CISOs can streamline security
solutions to spread the load for their
team. In moving away from ineffective,
labour-intensive legacy AV security
products, CISOs can help their team and
reduce the workload. In automating your
processes, you can free up your security
team for more pressing matters.
What are the biggest threats to
the endpoint?
An endpoint could be a computer
running Windows, Apple or Linux. Or it
could be a tablet, smartphone or some
other device on your network. Any of
these are potential endpoints where
malware can come in. Endpoint security
software such as ours uses behaviour-
based threat detection to detect threats
upon execution that cannot be detected
by known detection methods, such as
33