0 votes
in Technology by (1.7m points)

Does the security solution effectuate the security functions it is intended to perform?

1 Answer

0 votes
by (1.7m points)

Two primary attack vectors are exploited to compromise endpoints:

  • Malicious executables (malware)

  • Vulnerability exploits

Effective endpoint security solutions (products or technologies), must prevent malware and exploits (known and unknown variants) from compromising endpoints and servers.