The Forrester Wave™: Endpoint Security Suites, Q2 2018

Total Page:16

File Type:pdf, Size:1020Kb

The Forrester Wave™: Endpoint Security Suites, Q2 2018 NOT LICENSED FOR DISTRIBUTION The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up by Chris Sherman and Salvatore Schiano June 21, 2018 Why Read This Report Key Takeaways In our 21-criteria evaluation of endpoint security Trend Micro, CrowdStrike, And Symantec Lead suite providers, we identified the 15 most The Pack significant ones — Bitdefender, Carbon Black, Forrester’s research uncovered a market in Check Point, Cisco, CrowdStrike, Cylance, ESET, which Trend Micro, CrowdStrike, Symantec, Ivanti, Kaspersky Lab, Malwarebytes, McAfee, Check Point, ESET, Sophos, and Bitdefender are Microsoft, Sophos, Symantec, and Trend Micro — Leaders; Carbon Black, McAfee, Kaspersky Lab, and researched, analyzed, and scored them. This Cisco, Cylance, Microsoft, and Malwarebytes are report shows how each provider measures up to Strong Performers; and Ivanti is a Challenger. help security professionals make the right choice. Security Pros Want An Effective Endpoint Security Suite From Vendors They Trust Buyers want an endpoint security suite that is effective at stopping modern threats without adding to their security team’s complexity. They also want to trust the vendor, both as a strategic partner and as a steward of their data. Behavioral Analysis, Automation, And Real- World Performance Are Key Differentiators As traditional approaches to endpoint security prove less effective, behavioral protection and suite automation have become key differentiators in today’s market. Buyers also want to see real- world performance that backs up vendor claims. FORRESTER.COM FOR SECURITY & RISK PROFESSIONALS The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up by Chris Sherman and Salvatore Schiano with Christopher McClean, Madeline Cyr, and Peggy Dostie June 21, 2018 Table Of Contents Related Research Documents 2 Security Pros Are Demanding More-Effective The Forrester Wave™: Endpoint Security Suites, Endpoint Security Suites Q4 2016 3 Endpoint Security Suites Evaluation The State Of Endpoint Security, 2018 Overview TechRadar™: Endpoint Security, Q1 2017 Evaluated Vendors And Inclusion Criteria 6 Relevant Vendors Not Included In This Evaluation Share reports with colleagues. 6 Vendor Profiles Enhance your membership with Leaders Research Share. Strong Performers Challengers 15 Supplemental Material Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA 02140 USA +1 617-613-6000 | Fax: +1 617-613-5000 | forrester.com © 2018 Forrester Research, Inc. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester Wave, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. Unauthorized copying or distributing is a violation of copyright law. [email protected] or +1 866-367-7378 FOR SECURITY & RISK PROFESSIONALS June 21, 2018 The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up Security Pros Are Demanding More-Effective Endpoint Security Suites It’s 2018, and employee endpoints continue to be the most targeted asset type in the enterprise.1 Over the years, security teams have deployed a wide range of technologies to address threats to their corporate endpoints, and now many are opting for endpoint security suites with integrated prevention, detection, and automatic response. As vendors race to consolidate new methods of threat prevention with detection and response technologies, security teams have often found themselves unprotected due to gaps in coverage between products or they are otherwise unhappy with their choice of vendor and technology. Fundamental enterprise requirements are clear (see Figure 1): › Endpoint security suites must protect against modern threats. It’s no surprise that global enterprise security decision makers rate the evolving nature of IT threats as a top challenge.2 As attackers continuously advance their methods to target gaps in traditional endpoint products, security pros look to their vendors to advance their protection capabilities. This includes the ability to block the global-scale attacks that are increasingly using techniques similar to those previously seen in targeted attacks (e.g., file-less malware and user exploitation), raising the bar substantially for security suite functional expectations. › They should decrease endpoint complexity. IT environment complexity is another top challenge for global enterprise security decision makers; in fact, Forrester survey data shows that it’s the most frequently cited challenging issue.3 Complexity can come in many forms, but security teams are especially frustrated by deployment complexities that leave gaps in coverage, poorly laid out consoles that lead to challenging admin experiences, too many screens involved in day-to-day operations, and resources-draining performance issues like false positives and false negatives. Buyers want an endpoint security suite that consolidates capabilities and minimizes complexity when possible. › Vendors need to have strategies that inspire confidence. More than ever, trust is critical in the endpoint security market. Buyers need to trust that their vendors will keep products up-to-date and effective against new attacks without significantly disrupting their business or exposing new vulnerabilities. Buyers also want to trust their endpoint security vendor to serve as a strategic partner in times of need, while inspiring confidence that the leadership team’s vision will help prepare them for future challenges. Finally, buyers must trust that their vendors will be, without exception, good stewards of their corporate data. © 2018 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 2 [email protected] or +1 866-367-7378 FOR SECURITY & RISK PROFESSIONALS June 21, 2018 The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up FIGURE 1 A Modern Endpoint Security Suite Must Meet Three Fundamental Buyer Demands Functional Efficient Trustworthy • Automated prevention, • Low complexity • Belief in vendor’s detection, and • Positive user strategy remediation experience • Condence in • Full endpoint visibility • High precision with a vendor’s technology • Automation and low false positive rate • Trust in vendor’s orchestration brand Endpoint Security Suites Evaluation Overview To assess the state of the endpoint security suites market and see how the vendors stack up against each other, Forrester evaluated the strengths and weaknesses of the top vendors. After examining past research, user need assessments, and vendor and expert interviews, we developed a comprehensive set of 21 criteria, which we grouped into three categories: › Current offering. Each vendor’s position on the vertical axis of the Forrester Wave™ graphic indicates the strength of its current offering. Key criteria for this evaluation include malware and exploit prevention, behavioral detection, and product performance, which Forrester validated using customer feedback and third-party test results. › Strategy. Placement on the horizontal axis indicates the strength of the vendors’ strategies. Here, we evaluated corporate vision and focus, security community involvement, and product road map. › Market presence. Represented by the size of the markers on the graphic, our market presence scores reflect each vendor’s enterprise customer base and licensing partner presence. Evaluated Vendors And Inclusion Criteria Forrester included 15 vendors in the assessment: Bitdefender, Carbon Black, Check Point, Cisco, CrowdStrike, Cylance, ESET, Ivanti, Kaspersky Lab, Malwarebytes, McAfee, Microsoft, Sophos, Symantec, and Trend Micro. Each of these vendors has (see Figure 2): © 2018 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 3 [email protected] or +1 866-367-7378 FOR SECURITY & RISK PROFESSIONALS June 21, 2018 The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up › A security suite that can prevent, detect, and remediate endpoint threats. We consider solutions that offer only one or two of these three capabilities to be point products, not suites. › A strong enterprise market presence. We only included vendors with at least 100 enterprise customer accounts (1,000+ nodes deployed per enterprise) and at least one deployment with 100,000+ nodes. › A high degree of interest from enterprise buyers. We only included vendors that garner substantial interest from enterprise security decision makers. For example, Forrester clients ask questions about each vendor by name during inquiries and other interactions. © 2018 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 4 [email protected] or +1 866-367-7378 FOR SECURITY & RISK PROFESSIONALS June 21, 2018 The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up FIGURE 2 Evaluated Vendors: Product Information And Inclusion Criteria Vendor Product evaluated Version number Bitdefender GravityZone Endpoint Security 6.2 Carbon Black Cb Defense Check Point SandBlast Agent Complete Endpoint Protection E80.81 Cisco Advanced Malware Protection for Endpoints
Recommended publications
  • VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra Technických Studií
    VYSOKÁ ŠKOLA POLYTECHNICKÁ JIHLAVA Katedra technických studií Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí bakalářská práce Autor práce: Radek Kudrna Vedoucí práce: Mgr. Antonín Přibyl Jihlava 2020 ZADÁNÍ BAKALÁŘSKÉ PRÁCE Autor práce: Radek Kudrna Studijní program: Elektrotechnika a informatika Obor: Aplikovaná informatika Název práce: Návrh bezpečnostní politiky filtrování webového provozu ve školním prostředí Cíl práce: V teoretické části diskutujte návrh bezpečného přístupu k Internetu pro žáky škol včetně návrhu monitoringu přístupů, na druhou stranu je potřeba zvážit politiku nefiltrovaného přístupu k Internetu. Diskutujte právní fakt nemožnosti delegace právní odpovědnosti na nezletilé žáky, která souvisí s provozem školních (bezdrátových) sítí. V praktické části bude provedeno nasazení Kerio Control s Active Directory pro filtrování provozu na MŠ a ZŠ Brtnice. Mgr. Antonín Přibyl doc. Ing. Zdeněk Horák, Ph.D. vedoucí bakalářské práce vedoucí katedry Katedra technických studií Abstrakt Tato bakalářská práce se zabývá problémem přístupu k internetu pro školy, zejména pro základní školy. Při nefiltrovaném obsahu jsou nezletilí žáci vystaveni určitým rizikům. Jedná se především o přístup na stránky se závadným obsahem, možností stát se kybernetickou obětí, nebo k samotné možnosti páchání trestné činnosti přes školní internet. Pro zamezení těchto činností je nutnost zavést určitou bezpečnostní politiku v podobě filtrování webových stránek. Právě jednotlivé možnosti blokování stránek jsou v práci popsány. Součástí je i ukázka a popis řešení v nástroji Kerio Control, který je nasazen na filtrování provozu na základní a mateřské škole Brtnice. Klíčová slova filtrování provozu; Kerio Control; monitoring; nezletilí žáci; webový filtr Abstract This bachelor thesis deals with the problem of Internet access for schools, especially for primary schools.
    [Show full text]
  • Comodo Internet Security Essentials User Guide | © 2018 Comodo Security Solutions Inc
    Comodo Internet Security Essentials Software Version 1.3 User Guide Guide Version 1.3.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security Essentials- User Guide Table of Contents Comodo Internet Security Essentials.......................................................................................................................................... 3 What is Comodo Internet Security Essentials?.......................................................................................................................... 3 How do I install Comodo Internet Security Essentials?.............................................................................................................4 What is a man-in-the-middle attack?......................................................................................................................................... 6 How does Comodo Internet Security Essentials protect me from a man-in-the-middle attack?................................................7 What is the install location of Comodo Internet Security Essentials?........................................................................................8 How do I update CISE?............................................................................................................................................................. 8 Understanding alerts and configuring exceptions....................................................................................................................14
    [Show full text]
  • Comodo Internet Security Quick Start Guide | © 2020 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 12.2 Quick Start Guide Guide Version 12.2.050520 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - Quick Start Guide Comodo Internet Security - Quick Start Guide This tutorial explains how to use Comodo Internet Security (CIS). Please use the following links to go straight to the section that you need help with: • Installation • The main interface • Scan and clean your computer • Run an instant antivirus scan on selected items • Set up the Firewall for maximum security and usability • Set up HIPS for maximum security and usability • Run untrusted programs in the container • Browse the internet and run untrusted programs inside the Virtual Desktop • Renew or upgrade licenses • More Help Installation • If you haven't done so already, please download the CIS setup file from https://www.comodo.com/home/internet-security/security-software.php • Before beginning installation, please ensure you have uninstalled any other antivirus and firewall products that are on your computer. More specifically, remove any other products of the same type as those Comodo products you plan to install. • Double click the CIS setup file to start the installation wizard. • Click 'Options' if you wish to configure advanced options. • After finishing the wizard, CIS runs an initial scan • You will be asked to choose your type of internet connection • On completion of scanning, the scan results are shown. You can choose the action to be taken on the threats found, if any. • You need to reboot your computer to complete installation. A more detailed description of the options available during installation can be found in the installation guide at https://help.comodo.com/topic-72-1-772-9552-CIS-Installation.html The Main Interface The CIS interface is designed to be as clean and informative as possible while letting you carry out tasks with the minimum of fuss.
    [Show full text]
  • A Large-Scale Empirical Study on Industrial Fake Apps
    A Large-Scale Empirical Study on Industrial Fake Apps Chongbin Tang∗, Sen Chen∗, Lingling Fan∗, Lihua Xuy, Yang Liuz, Zhushou Tangx, Liang Dou∗ ∗East China Normal University, China yNew York University Shanghai, China zNanyang Technological University, Singapore xPwnzen Infotech Inc., China Abstract—While there have been various studies towards of app searching and downloading is greatly affected by the Android apps and their development, there is limited discussion fake apps in real world. of the broader class of apps that fall in the fake area. Fake Even worse, as the doorsill to develop an app has been set apps and their development are distinct from official apps and belong to the mobile underground industry. Due to the lack of low, the cost to develop a fake app is much lower than what it knowledge of the mobile underground industry, fake apps, their takes to develop a desktop program, providing an ideal hotbed ecosystem and nature still remain in mystery. for the underground industry to thrive on [3]. Moreover, the To fill the blank, we conduct the first systematic and com- flexibility of Android app implementation [4] contributes the prehensive empirical study on a large-scale set of fake apps. fake apps’ complexity. Over 150,000 samples related to the top 50 popular apps are collected for extensive measurement. In this paper, we present Despite the ubiquity, little is known about fake apps and discoveries from three different perspectives, namely fake sample their ecosystem – their common characteristics, the number characteristics, quantitative study on fake samples and fake au- of fake apps at large, their production process and speed, thors’ developing trend.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Comodo Internet Security User Guide | © 2019 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 6.3 User Guide Guide Version 6.3.082819 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ, 07013 United States Comodo Internet Security 6.3 - User Guide Table of Contents 1. Introduction to Comodo Internet Security.............................................................................................................................. 6 1.1.Special Features............................................................................................................................................................... 10 1.2.System Requirements....................................................................................................................................................... 13 1.3.Installation......................................................................................................................................................................... 13 1.3.1.CIS Premium - Installation........................................................................................................................................ 14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................27 1.3.3.CIS Complete - Installation and Activation...............................................................................................................39 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................52
    [Show full text]
  • Security Operations Center-As-A-Service Date: November 2018 Author: Tony Palmer, Senior Validation Analyst; and Jack Poller, Senior Analyst
    Enterprise Strategy Group | Getting to the bigger truth.™ Technical Review Comodo MDR: Security Operations Center-as-a-service Date: November 2018 Author: Tony Palmer, Senior Validation Analyst; and Jack Poller, Senior Analyst Abstract This ESG Technical Review documents hands-on testing of the Comodo MDR security operations center (SOC)-as-a-service platform. We focus on how Comodo MDR provides defense-in-depth for organizations’ network, endpoints, web, and cloud infrastructure as a bundled, cost-efficient service. The Challenges As ESG’s annual IT spending intentions survey reveals, the global cybersecurity skills shortage continues unabated. In 2018, 51% of respondents state their organization has a problematic shortage (see Figure 1), up from 45% in 2017.1 IT and security staff face an ever-growing amount of internally and externally generated data, hindering their ability to uncover and resolve threats quickly, and preventing them from keeping skills sets up to date. The skills gap threatens the ability of organizations to maintain effective security controls and minimize risk. Figure 1. Top Ten Areas of IT Skills Shortage In which of the following areas do you believe your IT organization currently has a problematic shortage of existing skills? (Percent of respondents, N=620, multiple responses accepted) Cybersecurity 51% IT architecture/planning 33% Server/virtualization administration 26% Data protection (i.e., backup and recovery) 26% Application development 25% Compliance management, monitoring and reporting 25% Business intelligence/data analytics 25% Mobile application development 24% Network administration 23% Storage administration 22% Source: Enterprise Strategy Group Organizations need effective cybersecurity management—aggregating data, prioritizing action, and distributing work—to handle the ever-increasing velocity and volume of cyber-attacks.
    [Show full text]
  • Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc
    Comodo Cloud Antivirus Software Version 1.20 User Guide Guide Version 1.20.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Cloud Antivirus - User Guide Table of Contents 1. Introduction to Comodo Cloud Antivirus................................................................................................................5 1.1.System Requirements..........................................................................................................................................6 1.2.Installation ...........................................................................................................................................................7 1.3.Start Comodo Cloud Antivirus............................................................................................................................16 1.3.1.The Main Interface....................................................................................................................................18 1.3.2.The Widget................................................................................................................................................22 1.3.3.The System Tray Icon...............................................................................................................................24 1.4.'Lucky You' Statistics..........................................................................................................................................25 1.5.Understand CCAV Alerts....................................................................................................................................29
    [Show full text]
  • LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console
    LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console Every moment you are connected to the LANDESK Antivirus helps you: Internet (and sometimes even when n Deliver the fastest response times to you’re not), you are under attack. minimize your risk of security breaches Today’s cyber attacks have become n Reduce cost and complexity with a extremely dynamic and exponentially centralized solution more complex. LANDESK Antivirus n Detect significant numbers of virus software delivers comprehensive anti- and malware instances missed by malware solutions that are powerful, other solutions through advanced efficient and easy to manage. LANDESK heuristics n Enable IT staff and executives to Antivirus uses the award-winning quickly see which systems are Kaspersky Anti-Virus Engine to to deliver protected and which are vulnerable comprehensive protection from a wide n Provide vulnerability assessments for range of malware including viruses, multiple platforms including Trojans, worms, rootkits, spyware, and Windows, Mac, Linux and HP-UX adware. Security Capabilities: n Kaspersky Lab Awards Real-time protection against multi- vector threats – Protect against Kaspersky Anti-Virus has received viruses, trojans, worms, spyware, multiple highest accolades from leading adware, rootkits, bootkits, independent testing labs: keyloggers, screencapture malware, botnets, zero-day attacks, drive-by download infections and other malicious vectors n System watcher – Monitors and analyzes system operations proactively for suspicious activity
    [Show full text]
  • Comodo Internet Security Installation Guide | © 2018 Comodo Security Solutions Inc
    Comodo Internet Security Software Version 11.0 Installation Guide Guide Version 11.0.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - Installation Guide 1. CIS Installation Please read the installation instructions carefully and review the system requirements before installing Comodo Internet Security. The CIS software itself is identical for all customers regardless of the package type. All versions (including free) include all security features, technologies and updates. The difference between the package types lies in the availability of additional services such as TrustConnect, Cloud Backup and the Comodo Guarantee. Activation of additional services is carried out after the base installation has been completed. Note - Before beginning installation, please ensure you have uninstalled any other antivirus and firewall products, including Comodo AV/FW/CES. Failure to remove other AV and FW products could lead to conflicts which cause CIS to function incorrectly. We advise users consult their vendor documentation for help to remove specific programs. However, the following steps should help most Windows users: • Click the 'Start' button to open the 'Windows Start' menu • Select Control Panel > Programs and Features (Win 10, Win 8/8.1, Win 7, Vista); Control Panel > Add or Remove Programs (XP) • Select your current antivirus or firewall program(s) from the list • Click 'Remove'/'Uninstall' button • Repeat process until all required programs have been removed Click the links below for detailed explanations: • CIS Premium - Installation • CIS Pro - Installation • CIS Complete - Installation 1.1.CIS Premium - Installation • Before beginning installation, please ensure you have removed any other antivirus and firewall products that are on your computer.
    [Show full text]
  • SEC RITY Is Without Nothing - 000 (SP)São Paulo BRASIL E “ U ” - Mail:[email protected]
    CYBERSECURITY NEWS CYBERSECURITY “SEC RITY” is nothing 2018 without APRIL APRIL “U” TOP STORIES OF STORIES TOP OngoingSecurity Av. Paulista 171, Andar 4 CEP 01.311-000 São Paulo (SP) BRASIL E-mail: [email protected] ▪ Cryptocurrency Leaks Personal Information for Thousands of Investors ▪ NATO Won Cyber Defence Exercise Locked Shields 2018 ▪ Oracle Weblogic Server POC(CVE-2018-2628) NEWS CYBERSECURITY ▪ Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide ▪ Facebook Tracking PoC via Faasos ▪ Uber's Bug Bounty Program ▪ Telegram DOWN - Popular messaging app not working as major outage confirmed ▪ Long Prison Sentence for Man Who Hacked Jail Computer System to Bust Out Friend ▪ Supporting Same-Site Cookies in Firefox 60 ▪ Two security experts discovered that the control panel of a Ski lift in Austria was exposed online without any protection ▪ PoC for a NTFS crash Windows7 & Windows10 versions ▪ NTLM Credentials Theft via PDF Files ▪ ISLAMIC STATE PROPAGANDA MACHINE HIT BY LAW ENFORCEMENT IN COORDINATED TAKEDOWN ACTION ▪ PoC Code Published for Triggering an Instant BSOD on All Recent Windows Versions ▪ Metamorfo Campaigns Targeting Brazilian Users 2018 ▪ Python-Based Malware Uses NSA Exploit to Propagate Monero (XMR) Miner ▪ "Rubella Macro Builder" Crimeware Kit Emerges on Underground APRIL APRIL ▪ Update to enable mitigation against Spectre, Variant 2 ▪ Necurs Evolves to Evade Spam Detection via Internet Shortcut File ▪ WORLD'S BIGGEST MARKETPLACE SELLING INTERNET PARALYSING DDOS ATTACKS TAKEN DOWN ▪ Cyber Security Breaches Survey 2018 ▪ Researchers Find Way to Create Master Keys to Hotels ▪ DDoS attacks in Q1 2018 ▪ RESEARCHERS HACKED AMAZON'S ALEXA TO SPY ON USERS, AGAIN TOP STORIES OF STORIES TOP ▪ Ski lift shut down on the same day ▪ Hacker Hijacks DNS Server of MyEtherWallet to Steal $160,000 ▪ Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach ▪ VPN Leaks Found on 3 Major VPNs ▪ Vulnerability Disclosure: Tegra SoCs ▪ Portugal Joins NATO Cyber-Defence Centre OngoingSecurity Av.
    [Show full text]
  • Ivanti Device and Application Control Version History Since V 2.6
    Ivanti Device and Application Control Version History Since v 2.6 Details NEW IN VERSION 5.1 Update 2 [29-May-2018] • More granular control over device attached/detached notifications Additional controls have been added such that the IDAC Control system tray icon remains visible but notifications relating to 'device attached/detached' are now suppressed. For more information refer to https://community.ivanti.com/docs/DOC-67782. • Authorization Wizard now scans inside MSP files Most Windows 10 and Office 2016 updates are delivered as MSP files rather than MSIs. In previous IDAC versions, the Authorization Wizard could only scan inside MSIs making it very difficult to whitelist updates that were delivered as MSPs. We've changed this in 5.1U2 so that the Auth Wizard now scans inside MSPs in addition to MSIs. • Windows 10 version Support We've added support for Windows 10 version 1803 (OS build 17134) which was released by Microsoft on April 30th. Refer to the following community article for details of Windows version support with Ivanti Device and Application Control https://community.ivanti.com/docs/DOC-62154. • Citrix XenApp and XenDesktop Support We've added support for versions 7.15 and 7.17 of Citrix XenApp and XenDesktop. • 7zip library updated We've updated the 7zip library to version 18.01 to address vulnerability CVE-2018-5996. 7zip versions prior to 18.00 contain insufficient exception handling which can lead to multiple memory corruptions and allow remote attackers to cause a denial of service attack or execute arbitrary code. • SQL 2017 Support We've added support for Microsoft SQL 2017.
    [Show full text]