10 March 2022 – VIPRE, a provider of internet security solutions purpose-built to protect businesses, has introduced Vulnerability and Patch Management (Endpoint Hardening) to its top-rated Endpoint Security Cloud service. These two features work together to give IT admins and Managed Service Providers (MSPs) increased visibility into network and device vulnerabilities, and enables them to apply patches right from the intuitive management portal making ‘Next Generation Endpoint Security’ simple.
Cyber threats continue to mature and escalate, with businesses suffering from 50% more cyberattack attempts per week in 2021, a trend likely to continue into 2022. And with the price tag on cyberattacks also increasing, it is becoming more difficult for businesses to keep up with the evolving security landscape. Traditional tools and methods used to combat cybercrime now fall short in a cloud-centric IT world, as zero-day threats, trojans, ransomware, and malware target all organisations, regardless of size.
Additionally, it is often difficult for businesses to discern whether a security vulnerability is a simple annoyance, or could lead to having a catastrophic business impact. Furthermore, the time and solutions required to stay on top of this daily cadence of new threats can often complicate matters, leaving organisations constantly a step behind both attackers and attacks.
However, what if there was a single, comprehensive tool that helped IT teams effectively manage these threats and allow them to harden the endpoints in an automated manner? In turn, it would make it far more difficult for attackers to break through, while also respecting the productivity needs of the business.
VIPRE’s enhanced Endpoint Security Cloud delivers next generation endpoint security in a simple, yet powerful cloud-based tool that gives IT admins the ability to handle such relentless attacks. With the addition of vulnerability and patch management, it helps to raise visibility to the risks posed by third-party applications within an organisation, while prioritising the weaknesses to address.
It then delivers embedded patch management to close discovered vulnerabilities automatically or with a simple click, while restricting other potential attacks with intrusion prevention, DNS Protection, and URL blockers. This simple solution supports organisations to reduce its attack surface, while gaining visibility with an interactive view of threats.
The Endpoint Security Cloud also offers multi-layered protection, against file, application, and network layer attacks. Through powerful technologies such as signature-based detection, heuristic analysis, and behavioural analysis, VIPRE Endpoint Security Cloud proactively spots vulnerabilities, including zero-day threats.
With these new features, VIPRE has implemented yet another of the UK National Cyber Security Centre’s core protection advisories. “Exploitation of known vulnerabilities in software remains the greatest cause of security incidents. Patching the process of applying updates from software developers, hardware suppliers and vendors, to either enhance functionality or to improve security is one of the most important things you can do to mitigate vulnerabilities.” This was also echoed in recent statistics, with identity, network, and endpoint security continuing to be points of emphasis for cybersecurity efforts with network security expected to grow the fastest at 24% between 2021 and 2026.
Robert den Drijver, vice president, VIPRE Europe, the Middle East and Africa (EMEA) concludes, “By upgrading our Endpoint Security Cloud service to include these two key functionalities, our customers and partners benefit from a fully customisable and modern cloud-based endpoint protection platform that enables them to be protected against a multitude of threats across their networks.
“At VIPRE, we have combined over 25 years of advanced security intelligence with cutting-edge machine learning, real-time behavioural analysis, and a deep, constantly learning threat intelligence network into a powerful tool to defend against today’s attacks and even tomorrow’s zero-day vulnerabilities.”
To find out more, click here.
Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow