Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

AI vs. Endpoint Attacks: What Security Leaders Need To Know


This article is part of Venturebeat’s special number, “Cyber ​​Standing PlayBook: walk the new threat period.” Read more Here is a special issue.

Enterprises continue to risk the risk of losing a weapon race to create fake bots and create fake bots to automate large language models (LLS).

Trading, competitors, non-signatures on the confidence of legitimate means, instead of relying on the situational execution, instead, use a generative AI to create a malicious program that is not affected. Gener AI is widely used to create large-scale automated phishing campaigns and automate social engineering, and the attackers wanted to use human vulnerabilities.

Gartner points in the latest Magic quadrant for Sonpoint protection platforms “Leaders in the protection market in the protection market is a prioritization of integrated security solutions that combine the latest point detection and response (EDR) and identity protection.

The result? An enterprise defenders are a more complicated threat while relying out outdated tools and technologies made for a different period.

The scale of these attacks is amazing. Zscaler’s Threat Absolutions Global Fishings showed about 60% of the attacks, and this rose of this rising belongs to the spread of Gen EU Invider schemes. In the same way, Ivani’s 2024 State report of cibers 74% of enterprises already see the effect of threats working in the EU. Nine 10 leadership, said they believe that the threats supported by AI are simply starting.

“After two minutes, you will break up enemy and take a day to search for a search, and a day in another day can you hope to continue to continue?” Elia Zaitsev, CTO Community a note Last interview with VentureBeat.

New Cyber ​​Weapons Race: Adkararial AI VS Endpoint AI Defense

Enemies, especially cyber crimes, adding faster to the arsenal of cyber crimes and the arsenals of enterprises, can add faster to the EU’s arsenals. General AI, Rogue can create new weapons on how to enemies from the aggressors to large-scale cyberburders.

“Although you are not a specialist, the Gen AI can create scripts or phishing emails from your behalf,” George Kurtz, Crowdstrike CEO and founding in the last World Economic Forum Report with CNBC. “It has never been easier for enemies. But good news, we have a massive opportunity to stay ahead, whether we connect AI in the defense correctly.”

As Gartner recommends: “The EU should look more powerful for traditional security measures in advanced security measures. Organizations must ensure effective integration with human decision-making ability to reduce risks.”

Etay Maor, Chief Security Strategy CATO networks“Enemies do not use the EU to automate the attacks,” The real problem is that the real problem is difficult to detect, the AI-power attacks are a single event. is the process of adaptation. ”

CATO celebrated in 2024 Business points The last year in the last year, the reliable login service expanded the cloud platform, CATO XDR, CATO EPPoint Protection Platform (EPP), Cato Digital Practice Monitoring (DEM) and Cato IOT / Grass Security, facilitate and combine security opportunities under a platform The purpose is carried. “We only get a share,” said Schlomo Kramer, Cato Co-Fonder and CEO. “We redefine how organizations have joined and secure security, changing the safety view of AI and the cloud.”

Combines their final points and identities zero is the future of trust. Enemies capitalize the speed of an unverified agent, which is becoming more unreliable for the end of an increase in dozens of identities. Using AI to use exploration on a scale on a scale, enemies are the top hand.

All these factors built together have set the stage for a new era of the AI-powerful endpoint security.

AI-Powered Endpoint Security, in a new era of unified protection

Legacy approaches security security – Interdomain is not enough to give confidence, perimeter-based security designs, several names. If the security of any network is assumed or based on the intended trust, this is better than already broken.

In the same way, the latest points that are with dozens of agents, which are loaded with them, including an antivirus program, perimeter program, perimeter firewall or worse, are generally leaving an organization as there is no cyberhiya defense strategy.

Gartner observes it: “Personality theft, phishing and data conference, security risks that require further attention. In order to solve these issues, the employee is in the security center, email, identity, information and application entrance in the security center in the security center. Workspace needs a security strategy. “

Daren Goeson stressed the growing problem of the SVP, the leadership of a single end point management in Ivantia. “Laptops, desks, smartphones and ioot devices are important for modern business, but their expanded numbers create more opportunities for attackers,” he said. “An incomplete vulnerability or outdated program can open the door to serious security risks. However, as their numbers grow, do opportunities for aggressors to exploit them.”

To reduce the risks, Gooon highlights the importance of centralized security and the EU-operating end point management. “EU-powered security means can analyze large amounts of information, reveal anomalies and predict the threats faster and more accurately predicted than human analysts,” he said.

Vineet Arora, CTO Have a snackAgreed: “AI tools are superior to analyzing rapidly between early data, end points and network traffic.

Recognizing CATO networks as a leader in Gartner 2024 magic quadrant for single-seller sase In addition, it emphasizes the change in the industry. By conveying network and security capabilities through a cloud-based platform, CATO allows organizations to solve a praise and network security that is critical in an end-point, which is a cavity operation.

To integrate AI, uem and zero confidence

Experts offer AI-Future Automation threatening detectionreduce response times and minimize security gaps. By integrating AI with a single endpoint management (UEM), enterprises obtain real-time views along the devices, users and networks – defining security gaps before exploiting. “

By actively preventing problems, “Tensions related to IT support are minimized, and the employee is dramatically decreased,” Ivii’s Ciso Mike Riemer.

Arora added that AI can automate daily assignments and automate the anomalies “,” human analysts are important for complex decisions that require business context – AI is not a standalone change. “

In order to oppose these threats, more organizations rely on AI to strengthen them zero confidence safety Frames. Zero Trust, AI is actively detected, when researching and needed, consists of constant confirming systems, when necessary, in real time. Advanced security platforms are integrating the EDR, XDR and personality protection into a single, intelligent defense system.

“When combined with AI, Ume solutions are even stronger,” he said. “AI-powered endpoint security tools analyzes anomalies and analyzes extensive databases to predict more accurate and more accurate and more accurate and more accurate. Devices, users and networks actively identify and close security gaps before full visibility. “

AI-powered platforms and growing demand for XDR solutions

Approximately all cyber security vendors along with AI and CEN AI projects, in turn and along their way maps. The goal is to increase the reaction of the danger of danger, reduce fake positives and create capable platforms with full XDR functionality. These areas include BlackBerry, Bitdefender, Cato networks, Cisco, Crowdstrike, Eset, Fortinet, Ivani, Sentinelone, Sophos, Sophos, Trend Micro and Zscaler.

Cisco It also pushes a platform-first approach, to enter the AI’s security ecosystem. “Security is a game of information,” said Ceetu Patel, EVP on Cisco, Venturebeat. “If you only have a platform with the email, it is interesting. However, email and end point, network packages and the Internet, if this is a platform that is more valuable. “

Each organization that interviewed by venturebeat values ​​is to combine security telemetry between end points, networks, personalities and clouds XDR. The XDR increases the detection of threatening by coordinating signals, increasing efficiency and reducing warning fatigue.

Riemer AI’s defense shift stressed: “For years, the attackers use the AI ​​in their favor. However, 2025 will notice a turning point in 2025.”

Riemer noted that the AI-Driver varies to be active in the endpoint security jet. “The AI ​​converts how security teams reveals early warning signs. AI-powered security tools can recognize samples at the bottom of the device and automate diagnostics before a problem, all work is not required.”

Arora stressed: “It is also important to evaluate the information, confidence and transparency of the AI ​​decision, which ensures that such vehicles are adapted to compliance with compliance and security strategies.”

The 2024th of Cato combines how developed SASE platforms are dangerous detection, user access control and iot / Oot protection in a service. These consolidation reduces complexity for security groups and supports the approach of a real zero confidence that provides continuous inspection on devices and networks.

Result: AI-based security coverage for a period of new threats

The perfect malware is moving, moving in AI, arming at the speed of machine to start targeted phishing campaigns and traditional protection. Takeaway is clear: Legacy endpoint security and patchwork solutions are not enough to protect against threats designed for static defense.

The enterprises must cover the AI-first strategy, which combines the latest point, ID and network security within the zero-power of power. AI-powered platforms are the key to detection and reducing the developing threats, which is built with real-time telemetry, XDR capabilities and forecasting intelligence.

As Kramer puts it, “cobled – each other’s cycle of security solutions ended.” Organizations that select an SASE platform include themselves to combat themselves in AI. CATO, among other leading providers, a combined, cloudy approach – marriage of the EU’s zero trust principles – cyber attacks will be the basis for the protection of enterprises from the next wave of cyber attacks.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *