How to
Jonathan Crowe
Apr 2016

Everything You Need to Know About Endpoint Security (New Guide)

Photo by Source


Introducing the IT Pro's Guide to Endpoint Protection

Endpoint security isn't as simple as it used to be. For one thing, it's no longer all about antivirus. For another, the threats we're facing — like phishing and ransomware — have changed.

To help navigate what's new and why it matters we've created a new comprehensive guide we're calling the IT Pro's Guide to Endpoint Protection. There's no form to fill out, so check it out here. 


Why did we create a guide on endpoint protection?
Three reasons.

1) We're in the midst of a revolution in endpoint security.

That's because the way companies have been securing their endpoints for years — by installing antivirus — is now widely considered to be ineffective on its own. 

The question that raises, of course, is what should you be using instead of (or in addition to) antivirus? A slew of new and established vendors are all jockeying to provide the go-to answer. Anti-malware, next generation antivirus, endpoint detection and response, the list of potential solutions goes on and on. 

As a result, this can be a chaotic time to be managing your company's security. Until the dust settles, things are going to be confusing. 

So one reason we created this guide is to provide simple, straightforward explanations of what these new solutions actually do. That way you can make better sense of what sets them apart. 

2) A lot of vendors are shying away from offering prevention. We think that's a bad idea. 

Users and their endpoints are widely considered to be the most vulnerable targets for cyber attacks. Yet instead of helping companies proactively fortify these at-risk targets and avoid infection in the first place, many of the new solutions being offered encourage companies to accept the fact that infection is bound to happen no matter what you do. The wiser investment, that line of thinking goes, is to focus on improving your ability to detect and respond to attacks after the fact. 

In our opinion, you should never have to voluntarily give up ground to cyber criminals. As they've shown time and time again, they will adapt their techniques to take full advantage of any opening they're given.

Don't get us wrong — monitoring and response tools are valuable pieces of the puzzle. But solutions solely focused on those capabilities are often geared toward large corporations with full teams of security experts who have the time and know-how necessary to analyze a host of alerts and make them actionable. 

More importantly, they're reactive. And even with all the advantages of a big security team and additional resources, taking a reactive approach instead of a proactive, preventitive one often means your efforts come too late.

Ransomware is a perfect example. The Barkly malware research team has clocked samples of TeslaCrypt encrypting files and locking systems less than a minute after executing. That leaves almost no time to react. That's why we recommend focusing on prevention and stopping attacks as close to the initial point of infection as possible. 

3) The clearer we can help make all this, the better for everyone. 

We're actively developing a new type of endpoint protection designed to help any IT pro stop malware and secure their business, no matter how big or small their company is, or how much time, expertise, or resources they have available.

Want to be the first to try Barkly and earn a $100 Amazon gift card while you're at it? Sign up for our Beta Group. 

Endpoint security is currently a crowded, confusing market, and we believe the only beneficiaries of that confusion are the status quo. We're confident in our solution, but regardless of whether it's the right one for you, we think you deserve to have resources that can help you cut through the noise and make the most informed decision possible. 

3 Ways to Use this Guide

As you skim through the guide (go ahead and check it out — it's ungated!), here are a few things to look out for you may find especially helpful: 


1) Get up to speed on advances in malware.

Malware is constantly evolving to avoid detection. A good case in point is VirLock, ransomware that also acts like a parasitic virus. To highlight the new techniques that make advanced malware like VirLock so dangerous the guide features a breakdown of what an attack looks like in action.


2) Make better sense of your security options.

There's no lack of "next generation" solutions out there vying to replace or augment A/V. To help you understand what does what we divided them into six general categories and provide detailed examples of each. 


3) Learn how to optimize your security stack.

The best security is a layered approach, but what exactly does that mean and where do specific types of solutions fit in? The guide offers a simple framework for thinking about your security layers and suggestions for how to prioritize. 

Check out the full guide by clicking the button below.  

Jonathan Crowe

Jonathan Crowe

Jonathan covers the latest threats and cybersecurity trends from a practical perspective.


Close the gaps in your security

Stop paying for AV, get the strongest protection instead. See how Barkly blocks attacks that are getting past AV.

See a demo


Stay informed!

Get the latest security news, tips, and trends straight to your inbox.