{"id":39118,"date":"2017-08-09T05:00:57","date_gmt":"2017-08-09T12:00:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=39118"},"modified":"2017-08-08T10:30:25","modified_gmt":"2017-08-08T17:30:25","slug":"threats-have-modernized-has-your-endpoint-security","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/08\/threats-have-modernized-has-your-endpoint-security\/","title":{"rendered":"Threats Have Modernized. Has Your Endpoint Security?"},"content":{"rendered":"<p>Signature-based approaches to endpoint security were sufficient when targeted malware and malware variants occurred in small numbers. But today, exploits successfully evade signature-based defenses as they typically target vulnerabilities and deliver sophisticated malware. Most endpoint security technology is now outdated.<\/p>\n<p>These evasive threats require advanced protection. IDC, in a recent Technology Spotlight sponsored by Palo Alto Networks, \u201c<a href=\"http:\/\/go.paloaltonetworks.com\/IDCTechSpotlight\">The Patient Zero Problem and the Need for Modern Endpoint Protection<\/a>,\u201d has outlined an approach for modern-day endpoint security.<\/p>\n<p>Rules for Modern Endpoint Security:<\/p>\n<ul>\n<li><strong>Signature-less approach<\/strong> \u2013 Endpoint security products that utilize a signature-less approach are more capable of preventing targeted malware and malware variants, zero-day threats and non-malware tactics.<\/li>\n<li><strong>Continuous protection<\/strong> \u2013 Advanced endpoint solutions should continuously provide protection to identify new and evasive threats.<\/li>\n<li><strong>Endpoint agent functionality<\/strong> \u2013 As endpoints continue to become more mobile and remote, endpoint security solutions should be able to provide protection regardless of connectivity to the network and with minimal performance degradation.<\/li>\n<li><strong>Solve the enterprise use case<\/strong> \u2013 Advanced endpoint solutions should offer a multilayered approach in a single offering while alleviating cumbersome configuration, updates and management issues typically caused by numerous point products.<\/li>\n<li><strong>Standards compliant<\/strong> \u2013 Endpoint security solutions should meet compliance regulations and standards today as well as more stringent future requirements. Customers should consider the long-term ability of an organization to meet these future needs.<\/li>\n<\/ul>\n<p>These rules outline necessary capabilities and features for a modern endpoint security solution capable of preventing today\u2019s sophisticated threats. For a more comprehensive look at IDC\u2019s Rules for Modern Endpoint Security, read the <a href=\"http:\/\/go.paloaltonetworks.com\/IDCTechSpotlight\">IDC Technology Spotlight<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threats have modernized. Has your endpoint security?<\/p>\n","protected":false},"author":226,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[598],"tags":[2675,4144],"coauthors":[2416],"class_list":["post-39118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint-2","tag-idc","tag-technology-spotlight"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=39118"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39118\/revisions"}],"predecessor-version":[{"id":39121,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39118\/revisions\/39121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=39118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=39118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=39118"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=39118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}