Best security endpoint solutions

Hi all,

New to the sub, I just got a new position at a company that only uses Mac, I was asked what would be the best security solution at the moment ? Can someone point out the best endpoint solutions

Thanks

πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/DecebalDac
πŸ“…︎ Jan 13 2022
🚨︎ report
A lot of endpoint security solutions a.k.a. virus scanners often deletes Go binaries when they reach a certain level of complexity. Crowdstrike just deletes every single Go executable. old.reddit.com/r/golang/c…
πŸ‘︎ 181
πŸ’¬︎
πŸ‘€︎ u/cmov
πŸ“…︎ Nov 14 2021
🚨︎ report
Watchguard Endpoint Security Essential

Did anyone took this exam? How was it and how many questions?

πŸ‘︎ 2
πŸ’¬︎
πŸ“…︎ Jan 12 2022
🚨︎ report
Frequency your endpoint security detection detects a REAL threat

Hi all,

Would you say your endpoint security solution (EPP/EDR/w.e) catches how many real attacks per month (< 10/100/1000)? and how much time do you spend clearing out the bogus alerts from the real ones ? Because in big enterprises I'm under the impression it's < 10.

πŸ‘︎ 216
πŸ’¬︎
πŸ‘€︎ u/shleimeleh
πŸ“…︎ Sep 26 2021
🚨︎ report
Endpoint Security policies for Windows Server?

Hi!

I was configuring some antivirus policies on the Endpoint Security panel of Intune and I saw this:

Windows Server policie without ConfigMgr?

Is posible to enforce Windows Server policies without ConfigMGR?? If not, what is this policie preview about??

I've been searching but I haven't found anything on Google or in Microsoft official docs.

Thanks in advice!

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/alexacdc1
πŸ“…︎ Dec 21 2021
🚨︎ report
API Security: API is the New Endpoint medium.com/technology-hit…
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/z3nch4n
πŸ“…︎ Jan 10 2022
🚨︎ report
What is the difference between endpoint Security and cloud security ?

Example : What is the difference between endpoint security of a win10 laptop vs win10 VM on a cloud ?

We are essentially deploying the same AV solution on both of them, so what is the difference ?

Any reading material, link etc would be appreciated.

πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/a_tease
πŸ“…︎ Jan 04 2022
🚨︎ report
Obsidian Security and CrowdStrike integration enhances Endpoint and SaaS visibility and response youtube.com/watch?v=_DFb1…
πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/BradW-CS
πŸ“…︎ Jan 07 2022
🚨︎ report
What are the most important metrics for measuring cloud and endpoint security?

I’m a software engineer and I joined a startup working on a cybersecurity platform. People often want reports and charts but everyone’s needs are fairly specialized. Sometimes I get the sense that folks want charts because it makes them look like the security tool is doing more, but I don’t want to produce noise. I’m trying to learn more about what really matters.

So for anyone who is familiar with EDRs or analyzing cloud logs, what do you care about measuring?

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/RowbotWizard
πŸ“…︎ Dec 05 2021
🚨︎ report
Updated Citrix Security Advisory for Log4Shell vulnerabilities. Citrix Endpoint Management and Linux VDA confirmed affected. support.citrix.com/articl…
πŸ‘︎ 24
πŸ’¬︎
πŸ‘€︎ u/_asterisk
πŸ“…︎ Dec 17 2021
🚨︎ report
ESFang - Exploring the macOS Endpoint Security Framework (ESF) for Threat Detection labs.f-secure.com/blog/es…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/netbiosX
πŸ“…︎ Dec 21 2021
🚨︎ report
Out of Cycle Security Advisory: Multiple Products: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints. (CVE-2021-44228)

Out of Cycle Security Advisory: Multiple Products: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints. (CVE-2021-44228)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259

πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/8bitaficionado
πŸ“…︎ Dec 13 2021
🚨︎ report
Updated Citrix Security Advisory for Log4Shell vulnerabilities. Citrix Endpoint Management and Linux VDA confirmed affected. (/r/Citrix) support.citrix.com/articl…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/ContentForager2
πŸ“…︎ Dec 21 2021
🚨︎ report
Trialling ESET endpoint security - WSL2 has lost Internet

I'm trialling ESET endpoint security for our compney, and the firewall has blocked wsl2 from the Internet.

Google show lots of examples of this problem in ESET forums, but I can't find a fix.

Can anyone please assist?

thanks :-)

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/jetfar
πŸ“…︎ Nov 25 2021
🚨︎ report
ESFang - Exploring the macOS Endpoint Security Framework (ESF) for Threat Detection labs.f-secure.com/blog/es…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/digicat
πŸ“…︎ Dec 21 2021
🚨︎ report
I made a quick video showing how to manage Windows Server security (Defender for Endpoint) via Intune. youtube.com/watch?v=sMK3q…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/ca2del
πŸ“…︎ Dec 21 2021
🚨︎ report
$GEN | T-Gen Wallet🧬 - World’s First Wallet with Prevention Endpoint Security Protocol | Presale Soon🚨

While existing solutions offer to solve just one problem at a time, Token Genesis team is up to building a secure, useful, & easy-to use wallet based on private blockchain. It will include easy cryptocurrency payments integration, and even a digital arbitration system. In the end, Token Genesis' aim is to integrate all companies, employees, and business assets into a unified blockchain ecosystem, which will make business truly efficient, transparent, and reliable. With help from the Token Genesis team, contributors and investors these are the milestones the community is looking forward to achieving.

What is the T-Gen Wallet πŸ“² ?

T-Gen Wallet is a cutting-edge cyber security protocol (T-Gen Protect) integrated into your personal crypto wallet that protects your personal data from being stolen by hackers. This project was designed to revolutionize the traditional crypto wallet.

What is the T-Gen Protect protocol βš™οΈ?

T-Gen wallet comes with the T-Gen Protect protocol. T-Gen Protect is an artificial intelligence (AI) based endpoint protection protocol (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats ; no human intervention, internet connections, signature files, heuristics or sandboxes required. AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites.

The app will be released on IOS & Android platform, Stay Tune πŸŽ‰

Early birds alway get good things - Pre sale benefit.

Price of token - Huge marketing initiative for token launch and collaborations with influencers in both crypto and mainstream media. This means that Token Genesis is planning for an explosive launch program. Getting in during presale ensures that token price is fixed, stable, and low.

Why Token Genesis?

Marketing & Influencers already planned for pre sale & DEX Launch

An ecosystem with multiple features planned

Experienced team & developers behind token & applications

Tokenomics:

  • Auto Buyback
  • Total tax : 10%
  • Buy : 0% Tax
  • Sell : 8% to hodlers, 2% to project fund

Token Total Supply: 1000 Trillion Tokens divided as such :-

  • 5 % Operations Staff & Hiring πŸ“—
  • 10 % Marketing (Airdrop Initiatives by governance ) πŸ“—
  • 15 % Project Fund πŸ“—
  • 15 % Presale Hardcap πŸ“—
  • 55 % Pancakeswap / Locked πŸ“—

Official Resources:

  • Website: https://token-genesis.com
  • Telegram Community: https://t.me/tokengen
... keep reading on reddit ➑

πŸ‘︎ 223
πŸ’¬︎
πŸ‘€︎ u/tkk28
πŸ“…︎ Oct 06 2021
🚨︎ report
iPhone and Macbook iCloud restores are bypassing Intune/Endpoint Security and allowing access?

I have intune policies that force users to connect their devices via Company Portal app on iPhone and Mac to open our emails in outlook and cloud files in OneDrive. If company portal is not installed on a new device, then they can't access our tenant. This is the correct method. Under conditional access, "Require Device to be marked as compliant" is turned on and required for granting access.

But I wiped a user's iPhone and when he restored his phone from iCloud, he still had access to our emails without his phone now showing in Endpoint security. Same with users that got new Macbooks. They did a cloud based restore of their files via iCloud and the new Macs were able to get emails and connect to OneDrive without them being added in Endpoint security via Company Portal enrollment.

Any advice?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/EvanWasHere
πŸ“…︎ Dec 14 2021
🚨︎ report
SE Labs has rated BlackBerry as the best new endpoint security offering of 2021

https://ca.finance.yahoo.com/news/blackberry-ranked-best-endpoint-protection-130000063.html

BlackBerry Limited (NYSE: BB; TSX: BB) today announced that SE Labs has rated BlackBerry as the best new endpoint security offering of 2021.

πŸ‘︎ 12
πŸ’¬︎
πŸ‘€︎ u/Onlyforonereason
πŸ“…︎ Nov 22 2021
🚨︎ report
Defender for Endpoint - should i be using device configuration or the endpoint security blade?

A quick glance and it looks like most settings available in device configuration are also available in the endpoint security blade. As long as i wont run into any restrictions / availability / conflict issues, i would like to do everything from a single pane.

Is there an advantage between them or would i run into any issues if i chose one over the other?

πŸ‘︎ 15
πŸ’¬︎
πŸ‘€︎ u/Less_Manufacturer
πŸ“…︎ Nov 01 2021
🚨︎ report
Out of Cycle Security Advisory&#x3a; Multiple Products; Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints. CVE-2021-44228 kb.juniper.net/InfoCenter…
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/8bitaficionado
πŸ“…︎ Dec 13 2021
🚨︎ report
Traditional endpoint security has evolving challenges on the horizon.

With unconventional methods such as electromagnetic spectrum, radio, and sound waves, cybercrime is evolving. How can IT Pros protect enterprise desktops with current hardware security?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/IntelBusiness
πŸ“…︎ Dec 14 2021
🚨︎ report
Security Center & enable private endpoints

Dear all,

I'm wondering why Azure is recommending to enable private endpoints for like every resource. We are controlling access already with virtual network rules and/or firewall rules. Currently i do not really see the need to enable private endpoints and provision it to a vnet. Since we also have some external static IPs which are whitelisted and not located inside the Azure subscription i don't really see the benefit there. Does anyone have experiences or thoughts on this?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/royce_vec
πŸ“…︎ Oct 27 2021
🚨︎ report
Defender for Endpoint showing zero devices with, or without sensor in Endpoint Security /r/Intune/comments/q6bw54…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/Eazy2020
πŸ“…︎ Oct 12 2021
🚨︎ report
Endpoint Security Policies not applying /r/sysadmin/comments/qain…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/MiniMica
πŸ“…︎ Oct 18 2021
🚨︎ report
Security researcher finds exposed endpoint with DHS terrorist watchlist containing nearly 2 million records bleepingcomputer.com/news…
πŸ‘︎ 268
πŸ’¬︎
πŸ‘€︎ u/selfagency
πŸ“…︎ Aug 21 2021
🚨︎ report
Need some advice with Endpoint Security!

Hello guys,

Started to work as a SysAdmin in a startup and they don't have no Endpoint Security, zero, nada, no security whatsoever.

I honestly never had to implement this myself from scratch and I'm the guy that will have to do it all, from searching the best solution, negotiating and deploying. So I decided to ask you guys, because I always get some invaluable information here!

So, what are you using in your companies, what to run away from? Better go traditional or new cloud based solutions?

My environment is full MacOS, around 400 devices, will deploy with Mosyle.

Thanks!

Best

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/Th30n3_R
πŸ“…︎ Sep 20 2021
🚨︎ report
Token Genesis - World’s First Prevention Endpoint Security Protocol | Presale Soon!🚨

Token Genesis is a cutting-edge cyber security protocol integrated into your personal crypto wallet that protects your personal data from being stolen by hackers. This project was designed to revolutionize the traditional crypto wallet.

The wallet is called T-Gen wallet and comes with the T-Gen Protect protocol. T-Gen Protect is an artificial intelligence (AI) based endpoint protection protocol (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats ; no human intervention, internet connections, signature files, heuristics or sandboxes required. AI detects and prevents attacks before they can execute, preventing users from opening URLs or visiting spoofing pages mimicking those of legitimate websites.

While existing solutions offer to solve just one problem at a time, Token Genesis team is up to building a secure, useful, & easy-to use wallet based on private blockchain. It will include easy cryptocurrency payments integration, and even a digital arbitration system. In the end, Token Genesis' aim is to integrate all companies, employees, and business assets into a unified blockchain ecosystem, which will make business truly efficient, transparent, and reliable. With help from the Token Genesis team, contributors and investors these are the milestones the community is looking forward to achieving.

Why Token Genesis?

  • Shill contest & Lucky Draw (Contestant automatically will get whitelist privilege) πŸ†
  • Fast Growing & Strong Community πŸ†
  • Locked Liquidity πŸ”
  • Minimal Dev Wallet πŸ†
  • Tokenomics πŸ†
  • And more to come….

Official Social Media:

  • Telegram Community: https://t.me/tokengenesis
  • Telegram Announcements: https://t.me/tokengenesisofficial
  • Twitter: https://twitter.com/TokenGenesis
  • Reddit: https://www.reddit.com/user/TokenGenesis
  • FB Page: https://www.facebook.com/tgenwallet

LETS BE THE ONE OF TOKEN GENESIS COMMUNITY NOW!

πŸ‘︎ 15
πŸ’¬︎
πŸ‘€︎ u/photoshopwiz1
πŸ“…︎ Sep 29 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.