Protection between patches
Zero day attacks exploit software or hardware vulnerabilities where there is no prior knowledge of the flaw. The attack occurs in the time between the vulnerability being discovered, and a patch being applied.
These attacks often bypass detection because they are unknown to the security vendors. Malware is created and waits for a user to click or download the infection, taking advantage of the lack of patch and exploiting a vulnerability in common applications like Java or Flash. From there, a payload is dropped and your data is at risk of breach.
- 0 % legitimate websites have unpatched vulnerabilities Symantec 2016
- 0 % malware is unique to an organization Verizon DBIR 2015
- 0 % attacks on the OS exploited vulnerabilities in the browser Kaspersky 2015
Defendpoint stops the attack
Defendpoint takes a proactive approach to stop malware from gaining access to your data and corporate information.
By ensuring that web content is always isolated, only trusted applications are allowed to run and all users operate in the context of a standard user account, you prevent malware from executing without relying on pattern matching or detection. This approach to security on the endpoint complements your patching and OS hardening strategies, ensuring that you are protected in the time between a vulnerability being discovered and a patch being applied.
Zero to hero: Stop the zero day attack
In this live webinar, renowned security expert and SANS instructor Dr Eric Cole explains how by taking a proactive approach to defense you can stop zero day vulnerabilities and Advanced Persistent Threats (APTs).
- Understand the importance of time in proactively preventing and responding to threats
- Learn how aligning to recommendations from SANS / CIS provides you with solid security foundations
- Discover how Defendpoint takes a unique approach to preventing, not detecting, attacks