Part #3: 5 Must-Have Endpoint Protections

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=uenF1Eetf8A



Duration: 11:12
1,095 views
6


This is the third episode of our 8-part video guide on How to Secure the Remote Workforce. Watch all the episodes here: https://www.checkpoint.com/security-admins-guide-to-secure-remote-workforce/

The third episode covers the top 5 protections you must look for in an endpoint security tool, and what kind of technology and functionality will best suit your organization’s needs, as well as the most recent threats to endpoint devices.

These must-have protections include:
• Anti-phishing capabilities that detect both known and unknown phishing attacks
• Anti-ransomware capabilities that are able to detect zero-day ransomware in real time before they reach users
• CDR (Content Disarm and Reconstruction) capabilities that provide safe versions of the document, removing exploitable content from documents by sanitizing them from all potentially harmful elements, making them 100% clean and delivering these sanitized versions within second
• Anti-bot capabilities which detect infected machines by continuously monitoring outgoing traffic and identifying the communications that occur with the command and control server
• Post-breach detection, remediation, and response capabilities




Other Videos By Check Point Software


2020-12-14Introduction to CloudGuard on Oracle Cloud Infrastructure: Peace of Mind as You Migrate to the Cloud
2020-12-04Account Takeover exploiting vulnerability in Android's Play Core Library Code - Demo
2020-12-02Siemplify SOAR + Check Point Integration – Playbook and Demo
2020-12-0140% of the World's Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?
2020-12-01A Glimpse Into The Future of Cyber Security
2020-11-24IDC Presents: Cloud Security, COVID-19, the New Normal and the Next Normal
2020-11-23Part #8: 5 Must-Have Protections for Office 365 and G Suite
2020-11-23Part #6: 5 Principles for Choosing the Right Mobile Security Solution
2020-11-23Part #5: The New and Dangerous Wave of Mobile Threats
2020-11-23Part #4: 5 Principles for Choosing the Right Endpoint Security
2020-11-23Part #3: 5 Must-Have Endpoint Protections
2020-11-23Part #2: 3 Key Principles for Securing the Remote Workforce
2020-11-23Part #1: Cyber Threats to the Remote Workforce in 2020
2020-11-23Check Point's Itai Greenberg on the New Security Log Analytics Service Using Azure Data Explorer
2020-11-20HashiCorp Consul Integration Overview
2020-11-19HashiCorp Consul Integration – Setup and Demo
2020-11-17ShiftLeft – Cloud Native Security in CICD Pipelines
2020-11-16Visibility in the Cloud
2020-11-16A Quick Intro to Visibility in the Cloud
2020-11-09Protecting Against CVE-2020-17087 Security Vulnerability (Now Escalates to Critical Cyber Threat)
2020-11-06Threat Hunting in the Cloud



Tags:
Remote workforce security
mobile security
email security
endpoint security
secure remote workforce