We changed our name from IT Central Station: Here's why
Endpoint Protection for Business (EPP) Questions
IT Engineer at UTMStack
Jan 20 2022

Hi, community!

Usually, when professionals administer the network, they use an Active Directory tool and a cybersecurity solution (e.g., EPP, anti-virus, or SIEM) separately.

Are you aware of SIEM platforms that integrate these tools?

Avraham SonenthalI agree with the users who mentioned Splunk. Splunk is a log message management… more »
Robert CheruiyotHi @Giusel, With the rise in insider threats, the idea of UEBA is becoming a… more »
6 Answers
Edwin Omondi Ambogo
Senior Technologist at LAIKIPIA UNIVERSITY
Nov 29 2021
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which ...
Read More »
2 Answers
Satish Singh
Cloud Security Architect at Kyndryl
Nov 06 2021
Hi dear professionals, I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions.  Please recommend the best product/solution that fits the requirements below (salient features and ex...
Read More »
Eric RiseSatish, Thank you for your well-thought-out and detailed question on this… more »
6 Answers
Nov 23 2021
Hello peers, I am working as an IT member at a research company with 200 employees (at most). I am looking at the pros and cons of SCCM and BigFix software.  At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly soluti...
Read More »
Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Kirk StephenWe have 1500 users and even with a reasonable sized support team we find SCCM… more »
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
5 Answers
PeerSpot (formerly IT Central Station)
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
Read More »
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
12 Answers
PeerSpot (formerly IT Central Station)
Dec 07 2021

Hi peers,

What is the difference between a compromise assessment and threat hunting? 

How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
5 Answers
Nurit Sherman
Content Specialist
PeerSpot (formerly IT Central Station)
Aug 25 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
Read More »
James KielyEnsure you have a defined set of outcomes. Communicate these expectations to the… more »
Jairo Willian PereiraMistakes: 1. Choosing only using a Gartner magic quadrant. 2. Don't consider… more »
ITSecuri7cfdOnce you have narrowed down the top 5 picks for a capability/solution, we… more »
18 Answers
System Administrator at Suez Canal Insurance
Aug 30 2021

What is the best for ransomware infection? 

Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
7 Answers
Ariel Lindenfeld
Sr. Director of Community
PeerSpot (formerly IT Central Station)
Nov 18 2021

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »
15 Answers