Blog Tag: Patch-Management

Endpoint Management: Discover Unknown Devices and Monitor Patches

April 22, 2016 by Yiyi Miao
Knowing what endpoints are operating within your network is one thing, but knowing what your endpoints are operating on is another. IT administrators need an easy, automated way to detect new devices entering their network, and a way to...

Deep Content Disarm and Reconstruction (Deep CDR), Part 1: The Case for Data Sanitization

July 09, 2015 by Szilard Stange
Document-based malware exploits are an incredibly common method for attack. The types of malware distributed via this method are representative of today's common threats; they rely on vulnerable applications, typically out-of-date...