There are thousands of cyber-attacks daily, due to vulnerabilities in computer endpoint networks are vulnerable and exposed to all kind of threats. Even with recent developments of Endpoint Detection and Response techniques, new ransomware methods are making them obsolete.
The process of creation is messy. It took millions of thoughts, experiments and chemical variations to produce the first COVID vaccine. While COVID vaccines are now available, new variants of the disease could soon make them useless, meaning it’s vital for those at risk to stay safely at home. The same can be said of the development of network and security solutions, and the corresponding threats and vulnerabilities posed by their growth. The best solution is to keep your devices protected. Developers often unknowingly create security gaps as they create, and threat actors find these gaps, and take advantage of them in thousands of different, and very effective ways. Thus, our urgent need for more robust endpoint security.
Technology innovation and creation has moved us forward into the future, but also is littered with vulnerabilities in its most basic code. The most recent pitfall comes in the form of 9 vulnerabilities which have exposed 100 million devices globally. Named “Wreck,” these flaws are found in networks between devices and the internet, and allow attacks to crash or remove devices or control them remotely, spreading laterally through a network full of devices and causing mayhem. There are patches available, but many administrators have not updated their systems, and don’t have plans to do so. They might subscribe to the theory that they simply won’t be a target, and don’t need security for their endpoints – but just as superbugs evolved to circumnavigate antibiotics, threats have evolved to bypass protections. Those who are putting all their money on not being noticed by threat actors, are forgetting that these vulnerabilities are already in their system! They are primed and ready for attackers to step in and take advantage.
According to Wired, Elisa Costante, VP of Research at Forescout, “With all these findings I know it can seem like we’re just bringing problems to the table, but we're really trying to raise awareness, work with the community, and figure out ways to address it. We've analysed more than 15 TCP/IP stacks both proprietary and open source and we've found that there's no real difference in quality. But these commonalities are also helpful, because we've found they have similar weak spots. When we analyze a new stack we can go and look at these same places and share those common problems with other researchers as well as developers.”
Researchers announced their findings in conjunction with the release of the patches, but there are still billions of endpoint devices exposed by the use of old software, poor endpoint security practices, or the misuse or dismissal of patches. These are old vulnerabilities, grandfathered in from generation to generation, and now a major source of conflict.
There is no easy fix. This is a systemic issue found in almost every network still using traditional or older endpoint security solutions. It’s a problem for everyone, and every device, and the cure is available, but sometimes ignored in favor of a “It can’t happen to me…” attitude. Endpoint security in the form of endpoint detection and response is the detection and monitoring potentially malicious activities at network endpoints, all in real-time, to provide total protection for the endpoint devices threatened by these endless vulnerabilities.
OWASP’s Top 10 vulnerabilities for 2020 are telling, and appropriate reading for those who are postponing their next patch or EDR deployment
On-premises software is installed and managed via an in-house server and infrastructure. This solution uses already-installed native computing resources and requires a licence from a vendor, creating ongoing expense. On-premises solutions boast total control, more flexible and manageable security, and easy software customization. Where on-premises falls short is inn agility and scalability, IT support, and cost for upgrades and updates.
A cloud-based endpoint protection solution is often referred to as a SaaS or Software as a Service solution, and is hosted and sometimes managed by third-party vendors. Cloud-based endpoint security is often deployed because of its lack of software piracy, lower operating costs, low technical requirements and easy scalability. Where it falls short is its lack of in-house control, limited range of applications and complex connectivity requirements.
SaaS and EDR are poised to win the ultimate battle for endpoint security, with a majority of CIO’s and decision makers loving the fast, easy, inexpensive and scalable cloud-based security.
Today is the day to learn more about Endpoint Detection and Response (EDR). Trusted by reputable companies like Coca-Cola, Sangfor Technologies is the vendor of choice for network-security-minded professionals and enterprises.
Sangfor Technologies is an APAC-based, global leading vendor of IT infrastructure solutions specializing in Network Security and Cloud Computing. Visit us at www.sangfor.com to learn more about Sangfor’s Security solutions, and let Sangfor make your IT simpler, more secure, and valuable.