home.aspx
 
. Resources/Whitepapers/50e0e7c4-d2b4-4096-89c9-a863589b0c1f_20180911_Whitepaper_Endpoint_CarbonBlack_Final.pdf
whitepaper
ESSENTIAL REQUIREMENTS FOR CLOUD-BASED ENDPOINT SECURITY
Endpoint protection began in the late 1980s with the introduction of the traditional antivirus (AV) that continues today as the first line of defense against known malware. But with the growth of cloud computing and mobile devices, the network perimeter has truly moved to the endpoint, and with that move comes the need for new techniques and tools that can counter threats before they take root. Traditional AV relies on malware signatures and simplistic behavioral rules to uncover threats to critical information endpoints: servers, applications, workstations and mobile computing devices. It also has a built-in time delay between when a threat is identified and a solution is published. DOWNLOAD