Intelligent CIO Middle East Issue 55 | Page 78

FEATURE: ENDPOINT PROTECTION /////////////// Channel partners have an important role to play in helping organisations ensure they have robust security strategies in place. And with increasing numbers of businesses moving to remote working models, it’s more important than ever for organisations to review and bolster their endpoint security policies. Tamer Odeh, Regional Director at SentinelOne in the Middle East, talks us through the key threats to the endpoint and outlines how organisations can ensure they have a comprehensive endpoint security strategy in place. CCan you give us an overview of some of the key threats to the endpoint? The endpoint is vulnerable to many types of cyberattacks that include: • Malware – Executables such as trojans, malware, worms, backdoors, payloadbased attacks • Malware – Fileless includes memory-only malware, no-disk-based indicators • Exploits of documents – Exploits rooted in Office documents, Adobe files, macros, spear-phishing emails Securing the endpoin in the age of re 40 INTELLIGENTCIO