Intelligent CIO Middle East Issue 55 | Page 82

FEATURE: ENDPOINT PROTECTION /////////////// With more and more staff members working remotely, this presents an opportunity for BEC fraud as the whole scam relies on communications that are never confirmed in person. Phishing campaigns are a threat for all employees whether they are based inhouse or remote, but for workers who are not used to working ‘home alone’ and are how they deliver value to Digital Transformation ca starting from data storag connection of IoT device network, migration of do processes to digital platfo access to applications an It means that, no matte do today, it is done digit WITHOUT STRONG PRE-EXECUT INFRASTRUCTURE, EVEN ATTACK THAT ARE SUCCESSFULLY MITIG CAN STILL CAUSE TREMENDOUS DAMAGE TO THE ENDPOINT. now dealing with an increase in email and other text-based communications, it can be easier for them to lose perspective on what is genuine and what is a scam. In particular, with a rise in malspam playing on fears of Coronavirus from the ‘usual suspects’ like Emotet and TrickBot, remote workers need to be extra-vigilant. Unlike the desktop computers in your office, which likely never connect to any other network than the company intranet, portable devices like laptops and smartphones used by remote workers can have a history of network promiscuity. If such devices are unprotected, you never really know where they have been, what they have been connected to, what peripheral devices have been plugged into them or what processes they are running. What endpoint security challenges does Digital Transformation pose? Digital Transformation means different things to every company – it can be hard to pinpoint a definition that applies to all. However, in general terms, Digital Transformation is the integration of digital technology into all areas of a business resulting in fundamental changes to how businesses operate and We are more connected we’re connecting more d Internet, more data is be transferred in digital form we are subject to more c The key objective for cyb access and steal our dat (our computers) is one o a wider network penetra internal and external ser everything else that repr value for them. Increasing connectivity a increase the number of c endpoint protection play in protecting valuable da Can you discuss s for your technolo Our Autonomous AI Plat attack every second of e applicable for any organ sectors and within public Can you tell us ho your solution to p large enterprises Our products, solutions a focused and we mainly w clients, as well as public 42 INTELLIGENTCIO