Latest Posts

New cannabis bill could see construction taking the high road

The proposed amendments to the Cannabis for Private Purposes bill that seeks to further decriminalise cannabis usage and legalise South…

Read More..

Luxury vs ultra-luxury – What’s the difference?

BESPOKE LIFESTYLE: There are a number of key factors that distinguish ultra-luxury homes form the rest, not least that they’re…

Read More..

Creating sustainable growth and reducing poverty through structural transformation

Urban development domains ACRC’s analytical framework uses the concept of urban development domains to transcend both sectoral and traditional systems-based…

Read More..

A root cause of flooding in Accra: developers clogging up the city’s wetlands

Christopher Gordon, University of Ghana Ghana has six designated Ramsar sites. These are wetlands designated under the criteria of the…

Read More..

Nigerian property crime could be reduced if neighbourhoods were better designed

Adewumi Badiora, Olabisi Onabanjo University Nigeria has a very high crime rate. The Global Peace Index ranked it the world’s…

Read More..

Inner cities are growth engines attracting young homebuyers

Inner city living is boosting the city residential property market and driving urban rejuvenation Inner cities. Love them or hate…

Read More..

Kenya’s push for affordable housing is creating opportunities despite barriers

Raphael M. Kieti, University of Nairobi; Robert W. Rukwaro, University of Nairobi, and Washington H.A. Olima, University of Nairobi In…

Read More..

Heron IVC: Walking the green talk

Waterfall is closing the loop on waste Waterfall prioritises sustainability and responsible environmental stewardship as a strategic imperative, keeping the…

Read More..

22nd Aug 2022

Architect Africa Online

Africa's Leading Architecture Aggregator

The 5 must-have considerations of endpoint protection solutions

By Ralph Berndt, sales and marketing director of Syrex

In today’s connected landscape, there is a growing complexity associated with safeguarding the myriad of endpoint devices accessing the corporate network. The unpredictability of attacks and threats are increasing, and threat actors are using increasingly sophisticated technologies to compromise devices.

Adding further impetus to this is the normalisation of a distributed working environment that sees employees using their personal devices to log in to back-end systems. Generally, employees at home are often prone to less than cautious behaviour and non-compliance with the corporate cybersecurity policy. Check Point research has found that 39% of security professionals are no longer confident in their existing endpoint protection with a further 50% of companies stating they will replace these solutions by 2023.

But selecting an effective endpoint protection solution has become a complicated undertaking. Here are the five must-haves of any such solution in the digital world.


Phishing has become one of the most significant threats facing end users and businesses today. Phishing attacks use advanced social engineering techniques that can easily trick employees into giving away sensitive information that can be used to either perpetrate identity theft or to commit fraud.

Having anti-phishing capabilities is one of the fundamental considerations when selecting an endpoint protection solution. It must be able to actively prevent the likes of zero-day phishing, impersonation, spear-phishing, and business email compromise.


Ransomware can be challenging to combat as companies do not know that they have been infected until it is too late. It can penetrate the organisation through multiple entry points such as the Web, email, and removable media devices.

When it comes to anti-ransomware capabilities, an endpoint protection solution must be able to defend against zero-day ransomware attacks and include an anti-ransomware engine that monitors changes to files on user drives. This enables the solution to identify ransomware behaviour such as illegitimate file encryption.

Content disarm and reconstruction (CDR)

No business can afford to inspect every email attachment and disrupt productivity. However, they can also not risk users downloading potentially infected files to their devices without screening them first. This requires a security solution that has automatic file sanitation features – CDR.

An effective endpoint protection solution can automatically scan all incoming files to ensure they are safe without disrupting the normal workflow. Furthermore, it can remove exploitable content from documents by sanitising them within seconds.

Anti-bot capabilities

Given their nature, bots present a formidable threat to any organisation. Hackers often use them in advanced persistent threat attacks that see them controlling the bots remotely to execute illegal activities. These bot attacks can result in data theft that can potentially result in companies having to close their doors.

A quality endpoint protection solution can therefore automatically detect and contain bot-driven infections. It can continuously monitor outgoing traffic and identify potential machines that are infected with bot malware.

Automated post-breach detection, remediation, and response

Even though traditional endpoint detection and response (EDR) solutions can detect suspicious behaviour, they cannot perform automatic remediation. Without this in place, the risk of attack residuals is greater.

Therefore, an endpoint protection solution that can automatically analyse, contextualise, and remediate incidents is worth its weight in gold. It must automatically determine if an event was an attack, how the hacker got in, what the impact has been, and how the systems must be cleaned.

Join me next time as I discuss the five principles behind selecting an optimal endpoint protection solution.


If you find this website useful please spread the word.

Follow by Email