Businesses are using the Internet to collect customer data and collaborate on company projects. Cybercriminals are organizing intricate attacks on the networks that businesses use to operate their data collection and project collaboration. The attacks are made to exploit the business by hijacking highly valuable data and files from the network in exchange for money while causing a major disruption in the business’s operations, or to use the data in a fraudulent manner.
But, just as cybercriminals are working hard to infiltrate networks, businesses are investing resources into protecting their networks from cyber attacks. Primarily, businesses are acknowledging that their networks are most vulnerable to attacks through various endpoints within their network, and so, they are investing in software that will protect those endpoints from attack.
So, what is an endpoint and how do cybercriminals use endpoint devices to attack networks?
An endpoint device is a remote computing device that communicates with a network to which it is connected. In short, an endpoint devices is a piece of hardware that connects with a network directly or through a computer. Some examples of endpoint devices include:
The importance of endpoint security continues to escalate as cybercriminal organizations develop more advanced technologies to infiltrate networks. When these organizations infiltrate networks, they are capable of uploading malware to damage expensive machines and, even worse, breach valuable data. And, with the rise of government policies and regulations such as the European Union’s General Data Protection Regulation (GDPR), companies and organizations are more liable than ever for the proper storage and protection of customer data.
Endpoint detection and response is an emerging field of cybersecurity that aims to protect networks from cyber attacks. The purpose of endpoint detection and response technology is to detect, contain, investigate, and eliminate network threats and attacks. This technology is critical for improving an organization’s data loss prevention capabilities.
By implementing endpoint detection and response technology in their network, companies and organizations can be sure that their machines and data are secure from cyber-attacks. And in the case of a successful attack, endpoint detection and response will be able to identify the root of the attack in order to eliminate it from the network and to help prosecute the cybercriminals.
The best endpoint detection and response technology will boast the security needed to protect networks from cyberattacks. This means that the technology should receive constant updates as cybercriminals continue to develop new ways to infiltrate and attack networks.
As technologically advanced as the endpoint detection and response product should be, it should also be intuitive and user-friendly for administrators to operate. Depending on the size of the business or organization, the IT skills of administrators or managers who are responsible for operating the EDR technology will vary. For this reason, the EDR technology should be relatively easy-to-use for when administrators need to investigate a potential threat or eliminate an actual attack.
Based upon the criteria of technology and ease-of-use, CurrentWare AccessPatrol is the best endpoint detection and response product available.
CurrentWare AccessPatrol has been designed and developed to enable administrators with the technology needed to successfully detect, contain, investigate, and eliminate endpoint threats and attacks.
Detect: Create reports to detect which endpoint devices were connected to the network and from where within the network they were connected, as well as any files that were transferred to or from those endpoint devices.
Contain: Configure endpoint device access settings to contain file transfers. For example, storage devices such as USBs or external hard drives can be set to “Read Only” mode which will prevent any file transfers to or from the endpoint device.
Configure the Read Only setting to prevent the transfer, deletion, copy, or editing of all files on the endpoint device.
Investigate: Create reports to determine file transfer history between endpoint devices in order to determine the origin of the threat or attack.
Determine which files were transferred between endpoint devices on the network with the File Transfer History report.
Eliminate: Eliminate the threat or attack by determining where it is located within the network through endpoint device reports.
CurrentWare’s solutions can be purchased individually for the greatest flexibility or as a bundle for the best value. When purchasing individually, BrowseReporter, BrowseControl, and AccessPatrol start at $3.99 USD per license per month (paid annually).
Volume license discounts are available starting for as low as 100 users, with discounts increasing depending on the number of licenses.
There are additional discounts available for educational organizations, non-profits, managed services providers, and for businesses that pre-purchase multiple year plans.
Looking for a quote? Contact our sales team here.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |