Protecting Data on Vulnerable Endpoints

BY

Tom Ricoy

|

July 16, 2020

Endpoints with known/zero-day vulnerabilities/exploits

Hundreds of millions of known vulnerabilities and exploits on endpoints exist with more announced every week within the OS, apps, browsers, BIOS, firmware, etc. Vulnerability assessment and patching tools exist to attempt to stay on top of these, but it is a significant undertaking to constantly update systems and keep them up to date.  

Patching often causes performance or usability issues, critical apps to stop working, and sometimes system crashes/BSODs. Updates often require restarts and end user downtime impacting productivity and employee satisfaction.  IT leaders are constantly balancing risk, user experience, and overhead to manage updates.  They ultimately choose which updates to roll out and how long after they are disclosed, leaving many PCs with known vulnerabilities and exposure to attack and data theft.  This leaves them at risk to being out of compliance, fines, IP loss, negative brand perception, paying ransoms, etc.

And all of this is for vulnerabilities we know about, not unknown.  

NGAV/white listing doesn’t detect these non-malware attacks because they use known good software certified by the vendor. EDR often doesn’t detect the nefarious activity or requires a security specialist to investigate but organizations are understaffed and can’t keep up with the investigations.

With more and more users working from home and syncing their entire orgs’ cloud repository locally on their PC, the risk of loss is tremendous.

Cigent D3E Zero Trust File Access

Vulnerabilities within OS, apps, and browsers that are used to steal endpoint data can be simply thwarted by requiring a user to authenticate to access their files.  This simple step blocks ransomware from encrypting documents and threat actors from accessing files.  

D3E can protect files by folder, partition, file type, or individual file.  It can be configured to always require authentication or integrate with popular vulnerability assessment tools to dynamically activate only on systems with known vulnerabilities/exploits.  Once the system is patched, it can revert to vulnerability-detection mode.  User authentication for file access can be as frictionless as facial recognition or use fingerprint, PIN, or authenticator OTP.

For vulnerabilities below the O/S, in the BIOS and firmware, TCG Opal 2.0 internal or external USB drives can be used to hide data from the O/S layer at the drive firmware layer, but still allow the user to access files with authentication on an as needed basis.

Cigent D3E allows IT leaders to protect their data and remain compliant while ensuring that their workforce stays productive.

Cigent D3E protects your files in a way that's never been done before.

Learn More

Explore more articles.

Protect your organization's most valuable asset—your data.

Contact Us