Short Newsletter Item Endpoint Protection Solutions

  • Uncategorized

ENDPOINT PROTECTION SOLUTIONS 4

The utilization of new technologies is the key element pushing ourgrowth and survival as a business in this modern age. We have adoptedsome computer programs, which have made our work processes moreefficient. However, in the same case, the use of these programs hasbrought about new risks and problems like hacking of our systems byindividuals looking to get sensitive information from theorganization without proper authorization. Our systms have also beeninfected by dangerous program viruses that have corrupted projectsand information, which took a lot of time to prepare. As a result, wehave started using anti-virus applications to protect our systemsfrom such attacks in the future.

Recently, we have experienced instances of bleaching of theanti-virus program by different viruses. Thus, we have decided tochange the company`s anti-virus application. We need to put in placea versatile endpoint protection platform that can keep pace with notonly the new threats to all forms of technologies but also the rapidgrowth of our company.

We analyzed the available endpoint protection platforms in the marketand decided to use McAfee Virus Scan. The E.P.P’s notable featuresinclude spyware protection, outbound, and inbound defense firewall,definition system updates, and system Guards. The developers built itwith the capability to protect files from viruses originating fromvarious systems like tablets, laptops, and phones (Lam, Chi, &ampQing, 2016).

Cybercrime attacks today are far more complex compared to the ones wehad in mind when putting in place the existing anti-virus software.Hence, we had to perform some tests to find the strengths andweaknesses of the selected E.P.P. Compared to our previous program,McAfee Antispyware can support Microsoft Outlook 2010. Besides, itfacilitates a real-time anti-virus scanning, which according to thedevelopers is intended to ensure the systems are protected allthrough. The E.P.P has an internal interface, which runs URL andscripts integration. The developers also built it to defend Microsoftapplications from being exploited by the overflowing buffers.Besides, it is meant to destroy policies, appraise reports, andhandle security alerts via the policy Orchestrator. Of note, thesoftware provides real-time protection against cyber threats (McAfee,2013).

Compared to the strengths, the weaknesses of the E.P.P are few butstill have to be considered before using it. It has two significantflaws, but they do not affect the operations. One of them is the on–demand scanning feature, which ensures the efficiency of the E.P.Pby scanning files whenever a need arises, although it restricts itscapability of scanning the components of the file systems. Secondly,the E.P.P developer has not managed to resolve the problem of memoryconsumption (Wyk, Graff, Burley &amp Peters, 2014). This was themajor discussion point when we were making the decision to take thisprogram.

In summation, compared to the current program, McAfee virus scan isbetter in almost all aspects and the most viable option to use inprotecting the company systems from any information security threat.Clients who have been using it claim that it performs better than theprevious E.P.P software. They purport that it lessens the damage frompossible outbreaks by closing the ports and monitoring the systemengines, and this helps to prevent the outbreak of viruses.

References

Lam, K., Chi, C., &amp Qing,&nbspS. (2016). Information andCommunications Security: 18th International Conference. NewYork: Springer.

McAfee (2013). What’s new: McAfee Virus Scan Enterprise, 8.8?Santa Clara: McAfee, Inc.

Wyk,&nbspK., Graff,&nbspM.&nbspG., Peters,&nbspD.&nbspS., &ampBurley,&nbspD.&nbspL. (2014). Enterprise software security: Aconfluence of disciplines. Boston: Addison-Wesley Professional.