0
Does the security solution effectuate the security functions it is intended to perform?

Open 1 Answers 39 Views Technology

Does the security solution effectuate the security functions it is intended to perform?

1 Answer

0

Two primary attack vectors are exploited to compromise endpoints:

  • Malicious executables (malware)

  • Vulnerability exploits

Effective endpoint security solutions (products or technologies), must prevent malware and exploits (known and unknown variants) from compromising endpoints and servers.

by (277k points)
...