Endpoint Protection (EPP) for Business Questions
User at TUBITAK
Jun 21 2021

Hello peers,

I am working as an IT member at a research company with 200 employees (at most).

I am looking at the pros and cons of SCCM and BigFix software. 

At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly solution because of my company's infrastructure and requirements.

What is your professional recommendation for me? Is SCCM going to bring unnecessary workload for a small company, such as mine? Also, is it worth choosing SCCM over BigFix based on its features, budget, etc?

Thank you!

Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
Rony_Sklar
IT Central Station
Jan 13 2021

There are many cybersecurity tools available, but some aren't doing the job that they should be doing. 

What are some of the threats that may be associated with using 'fake' cybersecurity tools?

What can people do to ensure that they're using a tool that actually does what it says it does?

SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »
Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
Rony_Sklar
IT Central Station

With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer. In our company, we use only company devices for… more »
Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »
Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »
Rony_Sklar
IT Central Station

Why should businesses invest in endpoint security?

What tips do you have for businesses to ensure that they have the right endpoint security measures in place?

Enayat GalsulkarThe endpoint is the weakest link on the network Since we put in all the best… more »
Menachem D Pritzker
Director of Growth
IT Central Station

On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.

Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.

The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.

How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »
Ken ShauretteI like the potential for catching an unusual activity like that with our… more »
Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM) 
Rony_Sklar
IT Central Station

What is the difference between a compromise assessment and threat hunting? How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
Rony_Sklar
IT Central Station

Which EPP provider does the best job at ransomware protection? Which provider is best at proactively defending against unknown threats?

Paresh MakwanaCylance: One of the fastest growing vendors in the Endpoint Security market,… more »
Steve PenderSentinelOne is my recommended solution. The SentinelOne Endpoint Protection… more »
reviewer1272021There are several good ones and it depends on budget, integrations needed, staff… more »
Mostafa
System Administrator at Suez Canal Insurance
May 11 2021

What is the best for ransomware infection? 

Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
Ariel Lindenfeld
Sr. Director of Community
IT Central Station
Mar 27 2021

Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »